Zero-Day Intelligence Integration
NEW in v3.5: Free Zero-Day Intelligence
Automatically enrich your scan results with real-time zero-day intelligence from CISA KEV, Exploit-DB, PoC-in-GitHub, and more - completely free with no authentication required.
CodePhreak now integrates with multiple authoritative sources to identify actively exploited vulnerabilities (zero-days) in your codebase. This feature provides enterprise-grade threat intelligence at 99.7% cost savings compared to proprietary intelligence feeds.
Quick Start
Basic Usage
# Scan with zero-day enrichment (FREE - no auth required)
codephreak-audit --target ./my-app --zero-day-check
# Combine with other workflows
codephreak-audit --workflow full-audit --zero-day-check --format sarifExample Output
🔍 Enriching findings with zero-day intelligence... 🚨 ZERO-DAY ALERT: 2 vulnerabilities with active exploits detected! └─ 2 in CISA Known Exploited Vulnerabilities catalog CVE-2024-12345 (CVSS 9.8) - Apache Log4j RCE ├─ Status: ACTIVELY EXPLOITED (CISA KEV) ├─ PoC Available: https://github.com/attacker/exploit ├─ Affected: backend/pom.xml (log4j-core 2.17.0) └─ Action: Upgrade to 2.17.1+ immediately 📊 Zero-day intelligence: 1,493 CVEs tracked, cache age: 1.3h
Data Sources
CodePhreak aggregates intelligence from 6+ authoritative free sources:
1. CISA KEV Catalog
U.S. government authoritative source for actively exploited vulnerabilities
- • Coverage: 1,000+ CVEs
- • Update: Daily
- • Authority: CISA
2. Exploit-DB
50K+ proof-of-concept exploits from Offensive Security
- • Coverage: 50,000+ PoCs
- • Update: Real-time
- • Authority: Offensive Security
3. PoC-in-GitHub
Real-time GitHub repository monitoring for exploit code
- • Coverage: GitHub repos
- • Update: Hourly
- • Authority: Community
4. Vulners.com
Aggregated data from 190+ vulnerability sources
- • Coverage: 190+ sources
- • Update: Real-time
- • Authority: Aggregator
Key Features
Automatic Severity Upgrade
Vulnerabilities found in CISA KEV are automatically upgraded to CRITICAL severity, ensuring they receive immediate attention.
Intelligent Caching
Local cache with 4-hour refresh interval and 7-day TTL. Initial fetch takes 10-30 seconds, subsequent scans use cached data (<100ms).
Exploit Links & Remediation
Enriched findings include direct links to exploit code, CISA required actions, remediation due dates, and PoC repositories.
Privacy-First Design
All intelligence is fetched and cached locally. No source code is transmitted. Only CVE IDs are matched against the local database.
Python API
from codephreak.security_auditor.tools.zeroday import (
ZeroDayFeedAggregator,
fetch_zero_day_intelligence,
)
# Fetch zero-day intelligence
zero_day_vulns = fetch_zero_day_intelligence(force_refresh=True)
# Check specific CVE
aggregator = ZeroDayFeedAggregator()
if aggregator.is_zero_day("CVE-2024-12345"):
print("⚠️ This CVE is actively exploited!")
# Enrich a finding
vuln = aggregator.enrich_finding("CVE-2024-12345")
if vuln:
print(f"CVSS Score: {vuln.cvss_score}")
print(f"In CISA KEV: {vuln.in_cisa_kev}")
print(f"Exploit URLs: {vuln.exploit_urls}")
# Get statistics
stats = aggregator.get_statistics()
print(f"Total CVEs tracked: {stats['total_vulnerabilities']}")
print(f"CISA KEV count: {stats['cisa_kev_count']}")Cost Advantage
99.7% Cost Savings vs. Enterprise Tools
| Activity | Competitors | CodePhreak | Savings |
|---|---|---|---|
| Zero-day research team | $1M-3M/year | $0 | 100% |
| Intelligence feeds | $50K-200K/year | $0 | 100% |
| PoC testing infrastructure | $100K-500K/year | $10K/year | 98% |
| Total | $1.15M-3.7M/year | $10K/year | 99.7% |
Configuration
Environment Variables
# Custom cache directory
export CODEPHREAK_ZERODAY_CACHE=/path/to/cache
# Force refresh interval (hours)
export CODEPHREAK_ZERODAY_REFRESH_HOURS=2Config File
# ~/.config/codephreak/config.yaml
zero_day:
enabled: true
cache_dir: ~/.config/codephreak/zeroday_cache
refresh_interval_hours: 4
retention_days: 7
sources:
- cisa_kev
- exploit_db
- poc_in_github
- vulnersPerformance
Related Documentation
Need Help?
For detailed implementation information, see docs/ZERO_DAY_INTEGRATION.md in the repository.