Skip to main content
Exclusive access to Vulnerability Assessment solution is provided solely for Enterprise users. If you are interested in learning more about the Enterprise Edition, please contact us.
Trickest’s Vulnerability Assessment solution enables security teams to continuously identify, analyze, and prioritize vulnerabilities across their infrastructure through adaptive, modular workflows. It combines network scanning, service fingerprinting, vulnerability detection, and compliance checking into a single customizable workflow that integrates seamlessly into existing security operations.

Solution Tabs

The Vulnerability Assessment solution experience is organized into three tabs that guide you from design to execution to outcomes:

Builder Tab

Design and customize the Vulnerability Assessment workflow. This view shows the prebuilt workflow graph and lets you tailor modules for scanning, enumeration, vulnerability detection, and reporting to your environment. Add open-source or in-house tools, define inputs and outputs, and configure the exact workflow used for vulnerability assessment.

Modules used in the Vulnerability Assessment Workflow

Data Integration
  • Get Data from Dataset: Pulls new assets from Attack Surface Management datasets (Web Servers, Open Ports, Network Services) for continuous vulnerability assessment.
Web Application Vulnerability Scanning
Network Service Vulnerability Scanning
The workflow operates as a continuous security layer on top of Attack Surface Management, automatically scanning newly discovered assets for vulnerabilities without requiring manual asset enumeration.

Configure and Execute Vulnerability Assessment

The Vulnerability Assessment solution is designed to continuously scan new assets discovered by Attack Surface Management for vulnerabilities. The workflow automatically queries ASM datasets for newly discovered assets and feeds them into vulnerability scanning modules.

How It Works

1

Pull web server URLs from ASM

Gets the url column from the Web Servers dataset where _status = new. These URLs feed into web application scanners that check for outdated software, exposed admin panels, misconfigurations, sensitive files, backups, and secrets.
2

Pull open port data from ASM

Gets ip_address, port, and hostname from the Open Ports dataset where _status = new. This data feeds into network misconfiguration scanners.
3

Pull network service details from ASM

Gets ip_address, port, hostname, and protocol from the Network Services dataset where _status = new. This data feeds into weak credential scanners for SSH, FTP, and databases.
All scans run automatically whenever ASM discovers new assets. Results appear in Insights where you can track vulnerabilities and prioritize fixes.

Default Configuration

By default, the workflow is configured to scan assets from the Attack Surface Management solution:
Solution: Attack Surface Management
Query: _status = new

Customizing Data Sources

You can modify the dataset queries to scan different asset sets: Scan all assets (not just new ones)
Query: (leave empty or use custom filter)
Scan assets from specific domains
Query: hostname ~ "example.com" AND _status = new
Use a different solution Change the Solution input to pull from other solutions (e.g., DAST, custom solutions) or use different datasets within ASM.
For query syntax and available operators, see Query Language Syntax.

Alternative Input Methods

If you’re not using Attack Surface Management, you can provide inputs directly: File Inputs Replace the dataset modules with file inputs containing your targets:
# targets.txt
example.com
app.example.com  
203.0.113.0/24
198.51.100.10
Script Inputs Use script nodes to generate target lists programmatically:
cat << "EOF" | tee out/output.txt
example.com
app.example.com
EOF
External Integrations Connect to CMDBs, asset inventories, cloud APIs (AWS, Azure, GCP), or ticketing systems using custom modules that output newline-delimited lists.

Run Tab

A specific execution of the workflow in time. You can start on-demand or scheduled runs, monitor node-level progress and logs, and review artifacts produced by each node. On the left sidebar you can see each node output and the status of the node. On the right sidebar you can see run list and when solution was executed.
For more information about workflow execution, check Monitoring Runs.

Insights

Explore the results generated by the workflow. View consolidated vulnerabilities, changes over time (new, fixed, resurfaced), severity distribution, affected assets, and compliance posture. Insights provides deltas, trends, and context to help prioritize remediation actions and integrate with downstream systems.
For more information about insights, check Insights.
Looking to adapt this Solution to your environment? See Custom Solutions for patterns and best practices.

Solution API

You can access Solutions API programmatically to list solutions, browse datasets, and fetch results. Most users don’t need to memorize endpoints—when you open any Solution in Trickest, you’ll find an “API Docs” panel with ready-to-use snippets (curl, Python, JavaScript) tailored to your workspace and the selected dataset.
Where to find it: Open a Solution → Click on API Docs button. It shows the correct base URL, your vault-scoped endpoints, and example requests you can copy and run.
I