🔒 Privacy-First Architecture
All analysis happens locally in your browser. Your inventory files never leave your device. No cookies, no tracking, no data storage. Everything disappears on page refresh.
1
Select Operating System
Choose your system type to generate the appropriate inventory command
Windows
PowerShell-based inventory
MSRC CSAF APILinux / macOS / Unix
Package manager inventory
OSV.dev API
2
Upload & Analyze
Upload your system inventory file for vulnerability analysis
Drop your inventory file here
or click to browse
Supports .json and .txt files
3
Vulnerability Report
Analysis complete
0
Critical
0
High
0
Medium
0
Low