KnownIssueScan — Known Vulnerability and Secret Detection
KnownIssueScan checks targets for known CVEs, common misconfigurations, and exposed secrets using Nuclei templates and the Kingfisher secret detection engine. It runs after the Discovery phase, leveraging all paths and endpoints discovered in earlier phases to maximize coverage.Why KnownIssueScan Matters
Many real-world breaches exploit publicly disclosed vulnerabilities (CVEs) that remain unpatched, or secrets accidentally committed to response bodies. KnownIssueScan systematically tests for these known issues across the entire discovered attack surface — catching low-hanging fruit that custom fuzzing-based modules are not designed to detect.How It Works
Configuration
KnownIssueScan is configured invigolium-configs.yaml under the known_issue_scan key:
Key Options
| Option | Default | Description |
|---|---|---|
tags | [] (all) | Include only templates matching these tags |
exclude_tags | [dos] | Exclude templates matching these tags |
severities | [] (all) | Filter results by severity level |
templates_dir | built-in | Path to custom Nuclei templates |
enrich_targets | true | Append discovered paths to target URLs for broader coverage |
Runtime Defaults
| Parameter | Default |
|---|---|
| Concurrency | 50 |
| Rate limit | 100 req/s |
| Timeout | 30 minutes |
Phase Execution Detail
- Queries distinct paths from the database via
GetDistinctPaths(). - Builds target URLs — either path-enriched (default,
enrich_targets: true) or host-level only. - Runs Nuclei templates against enriched targets with the configured concurrency and rate limits.
- Runs Kingfisher secret scanning on stored response bodies.
- Each finding is saved to the database with
ModuleType: "known-issue-scan"andFindingSource: "known-issue-scan". - Post-phase dedup: calls
DeduplicateFindings()to group findings with identical(module_id, severity, matched_at URL).
