Loading...
Loading...
Run testssl.sh to analyze TLS/SSL configurations. Checks cipher suites, protocols, certificate validity, known vulnerabilities (Heartbleed, POODLE, ROBOT), and compliance.
npx skill4agent add vchirrav/product-security-ai-skills tls-scan-testsslgit clone https://github.com/drwetter/testssl.sh.gitbrew install testssltestssl.sh --version./testssl.sh --versiontestssl.sh --json <hostname>:<port> > testssl-results.jsontestssl.sh --json example.comtestssl.sh --fast --json example.comtestssl.sh --protocols --json example.comtestssl.sh --cipher-per-proto --json example.comtestssl.sh --vulnerable --json example.comtestssl.sh --server-defaults --json example.com| # | Severity | Category | Finding | Details |
|---|----------|----------|---------|---------|| Vulnerability | Impact |
|---|---|
| Heartbleed (CVE-2014-0160) | Memory disclosure |
| POODLE (CVE-2014-3566) | SSLv3 padding oracle |
| ROBOT | RSA decryption oracle |
| BEAST (CVE-2011-3389) | CBC cipher weakness |
| CRIME (CVE-2012-4929) | TLS compression attack |
| FREAK (CVE-2015-0204) | Export cipher downgrade |
| Logjam (CVE-2015-4000) | Weak DH parameters |
| DROWN (CVE-2016-0800) | SSLv2 cross-protocol attack |