Live Demo · Sample data only
SafeCadence NetRisk — see it in action
Click any card, host, compliance tile, or attack-path node to drill into a sample report. The real product runs entirely on your network — no telemetry, BYO-AI keys, full source.
The live builder reads from real system data (34 sample assets pre-loaded — KEV CVEs, EOL gear, identity drift, attack paths). Pick sections + scope filters, preview live, export PDF/HTML/JSON. Read-only on the demo.
Network Risk Assessment
Hosts at risk
Top 10 devices by aggregated risk score. Click a row for findings, CVEs, recommended actions, and remediation timeline.
| Hostname | IP | OS / Vendor | Risk | Top finding |
|---|---|---|---|---|
| dc01 | 192.168.4.10 | Windows Server 2019 | 92 | Open SMBv1 + SeImpersonatePrivilege on service account |
| firewall-edge | 192.168.4.1 | FortiOS 7.0.5 | 88 | CVE-2024-21762 RCE KEV |
| esxi-prod-02 | 192.168.4.17 | VMware ESXi 7.0u3 | 90 | CVE-2024-22252 USB out-of-bounds write KEV |
| jenkins-build | 192.168.4.41 | Ubuntu 22.04 / Jenkins 2.387 | 79 | Anonymous job execution + outdated plugins |
| fileserv01 | 192.168.4.22 | Windows Server 2016 | 76 | SMB signing not required, EOL OS |
| pbx-asterisk | 192.168.4.55 | Asterisk 16.30 / Debian 11 | 58 | SIP exposed to LAN, default admin password |
| nas-synology | 192.168.4.30 | DSM 7.2 | 54 | SMBv1 enabled, two-factor auth disabled |
| printer-hp-1 | 192.168.4.61 | HP MFP M477fdw | 51 | Telnet enabled, default JetDirect creds |
| cam-axis-lobby | 192.168.4.71 | Axis OS 11.6 | 38 | HTTP exposed without TLS, default root password |
| switch-core | 192.168.4.2 | Cisco IOS 15.2 | 32 | Telnet enabled + SNMP v2c with public string |
Compliance posture
Findings auto-mapped to commonly-required frameworks. Click a tile to see top failing controls and plain-language remediation.
Attack-path graph
Sample lateral-movement chain — click any node to drill in. The real graph maps every reachable identity, host, and exposed service.
Top recommended actions
Prioritized by risk reduction per minute of effort. Click an action for step-by-step instructions and compliance impact.
Try it on your own network
The platform runs entirely locally — no telemetry, no cloud calls, your data never leaves your machine. Bring your own AI keys for narrative reports, or skip AI entirely and use the deterministic engine.
pip install 'safecadence-netrisk[server]' · safecadence demo · safecadence ui
Generated reports look like this
A snapshot of the management report SafeCadence NetRisk produces. Click a section to expand it inline. The full deliverable runs 30–80 pages depending on fleet size.
Acme Corp's 192.168.4.0/24 demo subnet was scanned in 49.8 seconds, identifying 40 active hosts with 47 findings across 134 mapped CVEs. 2 vulnerabilities are on the CISA Known-Exploited list and require immediate attention.
The single highest-leverage action is patching firewall-edge from FortiOS 7.0.5 to 7.0.13+, which removes the most likely external entry vector. Combined with disabling SMBv1 across dc01 and fileserv01, these two changes reduce aggregate risk by an estimated 46 points in under one hour of effort.
Compliance posture is strong on PCI DSS (91%) and SOC 2 (88%) but weak on HIPAA (67%), driven primarily by audit-log retention gaps and missing encryption on three legacy endpoints.
- FortiOS pre-auth RCE (CVE-2024-21762, KEV) — exposed at the perimeter, exploitable without credentials. Patch immediately.
- SMBv1 + missing SMB signing on dc01 — enables NTLM relay against the domain controller; combined with SeImpersonate it's a one-step path to Domain Admin.
- ESXi USB OOB write (CVE-2024-22252, KEV) — guest-to-host escape; affects the production virtualization cluster.
- Anonymous Jenkins job execution — exposed CI server allows unauthenticated remote code execution; pivots into build artifacts and signing keys.
- Default credentials cluster (3 devices) — printer, IP camera, and NAS all retain factory default passwords.
| IP | Hostname | Vendor | Open ports |
|---|---|---|---|
| 192.168.4.1 | firewall-edge | Fortinet | 443, 500, 4500, 10443 |
| 192.168.4.2 | switch-core | Cisco | 22, 23, 161, 443 |
| 192.168.4.10 | dc01 | Microsoft | 53, 88, 135, 389, 445, 3389 |
| 192.168.4.17 | esxi-prod-02 | VMware | 22, 80, 443, 902 |
| 192.168.4.22 | fileserv01 | Microsoft | 135, 139, 445 |
| 192.168.4.30 | nas-synology | Synology | 80, 443, 445, 5000 |
| 192.168.4.41 | jenkins-build | Ubuntu | 22, 8080, 50000 |
| 192.168.4.55 | pbx-asterisk | Debian | 5060, 5061, 10000-20000 |
| 192.168.4.61 | printer-hp-1 | HP | 23, 80, 443, 9100 |
| 192.168.4.71 | cam-axis-lobby | Axis | 80, 554 |
| CVE | CVSS | KEV | Affects |
|---|---|---|---|
CVE-2024-21762 | 9.8 | KEV | FortiOS 7.0.5 — firewall-edge |
CVE-2024-22252 | 9.3 | KEV | VMware ESXi 7.0u3 — esxi-prod-02 |
CVE-2023-23397 | 9.8 | — | Outlook NTLM relay — dc01 |
CVE-2022-37958 | 8.1 | — | Windows Server 2016 SPNEGO — fileserv01 |
CVE-2024-23897 | 9.8 | — | Jenkins arbitrary file read — jenkins-build |
CVE-2023-49606 | 9.8 | — | Tinyproxy use-after-free — pbx-asterisk |
| Framework | Score | Passing | Top gap |
|---|---|---|---|
| NIST CSF | 78% | 84/108 | PR.AC-4 — least-privilege not enforced |
| CIS v8 | 84% | 128/153 | 4.7 — manage default accounts |
| PCI DSS | 91% | 191/210 | 11.5.1 — change-detection mechanisms |
| HIPAA | 67% | 36/54 | 164.312(b) — audit log retention 90d |
| SOC 2 | 88% | 52/59 | CC7.2 — anomaly detection sources |
Within 24 hours: Patch FortiOS to 7.0.13+, disable SMBv1 on dc01 + fileserv01, enforce SMB signing.
Within 7 days: Patch ESXi to 7.0u3p+, rotate default credentials on printer / camera / NAS, restrict Jenkins to authenticated users only.
Within 30 days: Replace SNMP v2c with v3 + AES on switch fleet, disable Telnet, enable centralized log retention to satisfy HIPAA 164.312(b), document anomaly-detection sources for SOC 2 CC7.2.
Within 90 days: Plan migration off Windows Server 2016 (EOL), evaluate firewall replacement options if FortiOS continues to accumulate KEV entries, formalize quarterly NetRisk scans into the change-management calendar.
Get this sample report by email — weekly
Send the sample to yourself or a teammate. We'll email a clean version of this dashboard's findings (no signup, no spam — one email).
We'll email a single sample report to that address. No marketing list, no third-party trackers. SafeCadence is a private workspace — your data never leaves your network.
All data on this page is fictional. The real SafeCadence NetRisk runs locally on your network. No telemetry. BYO-AI.
← Back to all tools