CVEasy AI Documentation

Everything you need to set up, configure, and get the most out of CVEasy AI — the first complete CTEM platform.

Installation & Setup

1

Download the DMG

Download CVEasy AI_0.1.0_aarch64.dmg from your purchase confirmation email. The file is approximately 5GB — it includes everything needed to run offline.

2

Install to Applications

Double-click the DMG and drag CVEasy AI™ to your Applications folder. That's it — no Homebrew, no Python, no command line.

[ Screenshot: DMG install window — drag to Applications ]
3

Launch

Open CVEasy AI from Applications. On first launch, it will seed the database with 330,000+ CVEs (takes about 15 seconds) and start the AI engine automatically.

[ Screenshot: Loading screen with progress bar ]
4

Activate Your License

Go to Settings → License, paste your license key, and click Activate. Your key is in the purchase confirmation email.

No internet required. CVEasy AI runs entirely on your hardware. The AI engine, CVE database, and all features work completely offline. NVD sync happens automatically when online but is entirely optional.

First Steps After Installation

Once CVEasy AI is running, here's what to do first:

Option A: You have existing scan data

If your team runs Nessus, Qualys, Rapid7, or any other vulnerability scanner, import your most recent scan:

  1. Click Scan Imports in the sidebar
  2. Click Import Scan
  3. Upload your scan file (drag & drop or file picker)
  4. CVEasy auto-detects the format, creates assets, and links CVEs
[ Screenshot: Scanner import page with file upload ]

Option B: You don't have scan data

No scanner? No problem. BASzy discovers your assets automatically:

  1. Click BASzy in the sidebar
  2. Click New Scan
  3. Enter your network range (e.g., 10.0.0.0/24)
  4. BASzy™ scans the network, discovers assets, and tests for vulnerabilities
[ Screenshot: BASzy new scan page with network range input ]

How To: Import Scan Data

CVEasy AI supports 9 scanner formats with automatic format detection:

Scanner Format Extension
Tenable NessusXML.nessus
Qualys VMDRXML.xml
Rapid7 InsightVMXML / CSV.xml
OpenVAS / GVMXML.xml
NucleiJSONL.jsonl
Burp SuiteXML.xml
OWASP ZAPXML.xml
Aqua TrivyJSON.json
Any ScannerCSV.csv
Auto-detection: Just upload the file — CVEasy automatically detects the format. You don't need to specify which scanner produced it.

What happens after import

  1. Assets created — every host in the scan becomes an asset in your inventory
  2. CVEs linked — vulnerabilities are linked to assets with port and CVSS data
  3. Missing CVEs fetched — any CVEs not in the database are fetched from NVD automatically
  4. Risk scores calculated — TRIS™ scores computed for each CVE on each asset
  5. Attack surface updated — the attack surface view reflects the new data immediately

How To: Run Network Discovery

BASzy's discovery engine finds assets on your network without requiring any scanner software. It performs an 8-phase enumeration:

  1. ARP sweep — instantly discovers devices on the local subnet
  2. Ping sweep — identifies live hosts across the target range
  3. Port scan — checks 47 common ports on each live host
  4. Banner grab — reads service banners to identify software versions
  5. SSL/TLS analysis — extracts hostnames from certificates
  6. DNS resolution — reverse DNS lookup on all discovered IPs
  7. mDNS/Bonjour — finds Apple devices and IoT
  8. Classification — categorizes each device (server, workstation, router, printer, IoT)
[ Screenshot: BASzy discovery results showing network map ]
Authorization required. Only scan networks you are authorized to test. BASzy enforces scope boundaries — you must specify the authorized target range before scanning.

How To: Generate AI Remediation

CVEasy AI generates specific remediation playbooks — not generic "apply the latest patch" advice. Each playbook includes exact commands, verification steps, and rollback procedures.

1

Find the CVE

Browse CVEs or click on a finding from a scan import. The CVE detail page shows severity, TRIS™ score, affected products, and threat intelligence.

2

Click "Generate Remediation"

The AI engine generates a complete playbook in real-time. You'll see it stream in — typically 15-30 seconds.

[ Screenshot: AI remediation streaming with specific commands ]
3

Review and Apply

The playbook includes: Executive Summary, Severity Assessment, Immediate Actions (with verification), Patch Guide, Detection Queries, and Long-term Hardening.

Private knowledge base: Upload your internal runbooks, configuration standards, and exception policies to the Knowledge Base. The AI will reference them when generating remediation — so advice is specific to YOUR environment, not generic.

How To: Run BASzy Attack Campaigns

BASzy includes 10 pre-built attack campaigns that simulate real-world threat scenarios. Each campaign chains multiple techniques exactly like a real attacker.

Available Campaigns

Campaign Steps Validates
Ransomware Kill Chain10Email gateway, EDR, segmentation, backups
APT29 (Cozy Bear)7Supply chain, C2 detection, token theft
AD Zero to Domain Admin7Kerberos hardening, LAPS, tiered admin
Cloud Infrastructure Breach6IAM policies, IMDS, CloudTrail
Malicious Insider6DLP, USB controls, email monitoring
Initial Access Broker5Perimeter security, VPN, credential hygiene
Business Email Compromise5DMARC/SPF/DKIM, employee awareness
Web App SQLi→Shell→Data7WAF, input validation, segmentation
Network Segmentation4VLAN boundaries, firewall rules
Zero-Day Simulation5Behavioral detection, anomaly detection
[ Screenshot: BASzy campaign results with control validation matrix ]

Understanding Results

Each test in a campaign produces one of four outcomes:

How To: View Your Attack Surface

The Attack Surface view shows your entire environment from an attacker's perspective: which assets are exposed, which CVEs affect them, and how an attacker could chain exploits to reach your critical data.

[ Screenshot: Attack surface page with asset risk table and attack paths ]

Key elements:

How To: Generate Reports

Go to Reports in the sidebar. CVEasy generates professional PDF reports suitable for:

How To: Backup Your Data

Your CVEasy database contains all your vulnerability data, scan history, asset inventory, and configuration. Back it up regularly.

Manual Backup

  1. Go to Settings → Backup
  2. Click Create Backup
  3. The backup is saved to ~/Library/Application Support/CVEasy AI/backups/
  4. Click Download to save a copy externally

Restore from Backup

  1. Go to Settings → Backup
  2. Click Restore next to the backup you want
  3. A safety backup of your current data is created automatically
  4. Restart CVEasy AI to complete the restore
Backup location: ~/Library/Application Support/CVEasy AI/backups/
Copy this folder to external storage for disaster recovery.

TRIS™ Scoring — How It Works

TRIS™ (Threat & Remediation Intelligence Score) is a proprietary 7-layer scoring engine that goes far beyond CVSS:

  1. CVSS Base Score — technical severity of the vulnerability
  2. EPSS Probability — likelihood of exploitation in the next 30 days
  3. CISA KEV Status — is this actively exploited in the wild?
  4. Threat Actor Targeting — are known APT groups using this CVE?
  5. Asset Criticality — how important is the affected asset?
  6. Public Exposure — is the asset internet-facing?
  7. BASzy Validation — was exploitability proven by attack simulation?

TRIS produces a score from 0-95 and assigns a priority band:

Compliance Mapping

CVEasy maps every CVE to 86 controls across 9 compliance frameworks:

Supported Scanner Formats

CVEasy accepts exports from all major vulnerability scanners. Upload the file and format is auto-detected. Supported: Nessus, Qualys, Rapid7 InsightVM, OpenVAS/GVM, Nuclei, Burp Suite, OWASP ZAP, Aqua Trivy, and generic CSV (any scanner that exports CSV).

Keyboard Shortcuts

⌘KOpen search
⌘JOpen AI chat
⌘/Toggle sidebar

EDR Whitelisting

BASzy performs authorized security testing that may trigger EDR/AV alerts. Whitelist the following before running attack simulations:

/Applications/CVEasy AI.app/Contents/MacOS/cveasy-ai
/Applications/CVEasy AI.app/Contents/MacOS/cveasy-server
/Applications/CVEasy AI.app/Contents/MacOS/llama-server
/Applications/CVEasy AI.app/Contents/MacOS/baszy-server

Detailed instructions for CrowdStrike Falcon, SentinelOne, Microsoft Defender, Carbon Black, and Sophos are available in our EDR Whitelisting Guide.

Frequently Asked Questions

Does CVEasy AI need internet access?

No. CVEasy runs 100% offline. The AI engine, CVE database (330,000+ CVEs), and all features work without internet. When online, it automatically syncs new CVEs from NVD, but this is optional.

Can I use my existing Nessus/Qualys scans?

Yes. Upload your scan files directly — CVEasy supports 9 scanner formats including Nessus (.nessus), Qualys XML, Rapid7 XML, OpenVAS, Nuclei, Burp Suite, ZAP, Trivy, and generic CSV. Assets are auto-created and CVEs auto-linked.

What if I don't have a vulnerability scanner?

You don't need one. BASzy's built-in discovery engine scans your network, identifies assets, fingerprints services, and tests for vulnerabilities — all without external tools.

How is TRIS™ different from CVSS?

CVSS measures technical severity. TRIS™ measures actual risk by combining 7 signals: CVSS, EPSS (weaponization probability), CISA KEV (active exploitation), threat actor targeting, asset criticality, public exposure, and BASzy validation (proven exploitability). A CVSS 7.5 that's being actively exploited by APT29 against your industry scores much higher than a CVSS 9.0 that's theoretical.

Is BASzy safe to run in production?

BASzy respects authorization levels. In "low_impact" mode (default), all tests are non-destructive — they detect vulnerabilities without exploiting them. Aggressive testing requires explicit authorization and is designed for dedicated test environments.

How do I back up my data?

Go to Settings → Backup → Create Backup. The backup includes your entire CVE database, scan history, asset inventory, findings, and configuration. Download the backup file to external storage for disaster recovery.

What hardware do I need?

Lite: Mac Mini M2 or later with 16GB unified memory. Pro: Mac Studio M2 Max or later with 36-64GB unified memory. Apple Silicon (M1/M2/M3/M4) is required for the built-in AI engine.

Can multiple people use one installation?

Yes. CVEasy runs as a web application on your local network. Anyone on the same network can access it via browser at the server's IP address. Enterprise licenses support unlimited concurrent users.

How do I update CVEasy AI?

Download the latest DMG from your account and install over the existing application. Your database and settings are preserved — they're stored in ~/Library/Application Support/CVEasy AI/, not inside the app bundle.

What compliance frameworks are supported?

CVEasy maps to 86 controls across 9 frameworks: HIPAA, PCI-DSS v4.0, SOC 2 TSC, ISO 27001:2022, NIST CSF v2.0, CIS Controls v8, FedRAMP (NIST 800-53), GDPR, and CCPA. Each CVE shows which compliance controls it threatens.

Will BASzy trigger my EDR/antivirus?

It might — that's actually the point. BASzy tests whether your security controls detect attack techniques. If your EDR blocks a BASzy test, that's a PASS. If it doesn't, that's a gap to fix. For smooth operation, whitelist CVEasy AI in your EDR before running campaigns.