CVEasy AI Documentation

Everything you need to set up, configure, and get the most out of CVEasy AI, the first complete CTEM platform.

Installation & Setup

1

Download the DMG

Download CVEasy AI_1.0.0_aarch64.dmg from your purchase confirmation email. The file is approximately 5GB, it includes everything needed to run offline.

2

Install to Applications

Double-click the DMG and drag CVEasy AIβ„’ to your Applications folder. That's it, no Homebrew, no Python, no command line.

[ Screenshot: DMG install window, drag to Applications ]
3

Launch

Open CVEasy AI from Applications. On first launch, it will seed the database with 328,000+ CVEs (takes about 15 seconds) and start the AI engine automatically.

[ Screenshot: Loading screen with progress bar ]
4

Activate Your License

Go to Settings β†’ License, paste your license key, and click Activate. Your key is in the purchase confirmation email.

No internet required. CVEasy AI runs entirely on your hardware. The AI engine, CVE database, and all features work completely offline. NVD sync happens automatically when online but is entirely optional.

First Steps After Installation

Once CVEasy AI is running, here's what to do first:

Option A: You have existing scan data

If your team runs Nessus, Qualys, Rapid7, or any other vulnerability scanner, import your most recent scan:

  1. Click Scan Imports in the sidebar
  2. Click Import Scan
  3. Upload your scan file (drag & drop or file picker)
  4. CVEasy auto-detects the format, creates assets, and links CVEs
[ Screenshot: Scanner import page with file upload ]

Option B: You don't have scan data

No scanner? No problem. BASzy discovers your assets automatically:

  1. Click BASzy in the sidebar
  2. Click New Scan
  3. Enter your network range (e.g., 10.0.0.0/24)
  4. BASzyβ„’ scans the network, discovers assets, and tests for vulnerabilities
[ Screenshot: BASzy new scan page with network range input ]

How To: Import Scan Data

CVEasy AI supports 9 scanner formats with automatic format detection:

Scanner Format Extension
Tenable NessusXML.nessus
Qualys VMDRXML.xml
Rapid7 InsightVMXML / CSV.xml
OpenVAS / GVMXML.xml
NucleiJSONL.jsonl
Burp SuiteXML.xml
OWASP ZAPXML.xml
Aqua TrivyJSON.json
Any ScannerCSV.csv
Auto-detection: Just upload the file. CVEasy automatically detects the format. You don't need to specify which scanner produced it.

What happens after import

  1. Assets created, every host in the scan becomes an asset in your inventory
  2. CVEs linked, vulnerabilities are linked to assets with port and CVSS data
  3. Missing CVEs fetched, any CVEs not in the database are fetched from NVD automatically
  4. Risk scores calculated. TRISβ„’ scores computed for each CVE on each asset
  5. Attack surface updated, the attack surface view reflects the new data immediately

How To: Run Network Discovery

BASzy's discovery engine finds assets on your network without requiring any scanner software. It performs an 8-phase enumeration:

  1. ARP sweep, instantly discovers devices on the local subnet
  2. Ping sweep, identifies live hosts across the target range
  3. Port scan, checks 47 common ports on each live host
  4. Banner grab, reads service banners to identify software versions
  5. SSL/TLS analysis, extracts hostnames from certificates
  6. DNS resolution, reverse DNS lookup on all discovered IPs
  7. mDNS/Bonjour, finds Apple devices and IoT
  8. Classification, categorizes each device (server, workstation, router, printer, IoT)
[ Screenshot: BASzy discovery results showing network map ]
Authorization required. Only scan networks you are authorized to test. BASzy enforces scope boundaries, you must specify the authorized target range before scanning.

How To: Generate AI Remediation

CVEasy AI generates specific remediation playbooks, not generic "apply the latest patch" advice. Each playbook includes exact commands, verification steps, and rollback procedures.

1

Find the CVE

Browse CVEs or click on a finding from a scan import. The CVE detail page shows severity, TRISβ„’ score, affected products, and threat intelligence.

2

Click "Generate Remediation"

The AI engine generates a complete playbook in real-time. You'll see it stream in, typically 15-30 seconds.

[ Screenshot: AI remediation streaming with specific commands ]
3

Review and Apply

The playbook includes: Executive Summary, Severity Assessment, Immediate Actions (with verification), Patch Guide, Detection Queries, and Long-term Hardening.

Private knowledge base: Upload your internal runbooks, configuration standards, and exception policies to the Knowledge Base. The AI will reference them when generating remediation, so advice is specific to YOUR environment, not generic.

How To: Run BASzy Attack Campaigns

BASzy includes 10 pre-built attack campaigns that simulate real-world threat scenarios. Each campaign chains multiple techniques exactly like a real attacker.

Available Campaigns

Campaign Steps Validates
Ransomware Kill Chain10Email gateway, EDR, segmentation, backups
APT29 (Cozy Bear)7Supply chain, C2 detection, token theft
AD Zero to Domain Admin7Kerberos hardening, LAPS, tiered admin
Cloud Infrastructure Breach6IAM policies, IMDS, CloudTrail
Malicious Insider6DLP, USB controls, email monitoring
Initial Access Broker5Perimeter security, VPN, credential hygiene
Business Email Compromise5DMARC/SPF/DKIM, employee awareness
Web App SQLi→Shell→Data7WAF, input validation, segmentation
Network Segmentation4VLAN boundaries, firewall rules
Zero-Day Simulation5Behavioral detection, anomaly detection
[ Screenshot: BASzy campaign results with control validation matrix ]

Understanding Results

Each test in a campaign produces one of four outcomes:

How To: View Your Attack Surface

The Attack Surface view shows your entire environment from an attacker's perspective: which assets are exposed, which CVEs affect them, and how an attacker could chain exploits to reach your critical data.

[ Screenshot: Attack surface page with asset risk table and attack paths ]

Key elements:

How To: Generate Reports

Go to Reports in the sidebar. CVEasy generates professional PDF reports suitable for:

How To: Backup Your Data

Your CVEasy database contains all your vulnerability data, scan history, asset inventory, and configuration. Back it up regularly.

Manual Backup

  1. Go to Settings β†’ Backup
  2. Click Create Backup
  3. The backup is saved to ~/Library/Application Support/CVEasy AI/backups/
  4. Click Download to save a copy externally

Restore from Backup

  1. Go to Settings β†’ Backup
  2. Click Restore next to the backup you want
  3. A safety backup of your current data is created automatically
  4. Restart CVEasy AI to complete the restore
Backup location: ~/Library/Application Support/CVEasy AI/backups/
Copy this folder to external storage for disaster recovery.

TRISβ„’ Scoring. How It Works

TRISβ„’ (TrueRisk Intelligence Score) is a proprietary 7-layer scoring engine that goes far beyond CVSS:

  1. CVSS Base Score, technical severity of the vulnerability
  2. EPSS Probability, likelihood of exploitation in the next 30 days
  3. CISA KEV Status, is this actively exploited in the wild?
  4. Threat Actor Targeting, are known APT groups using this CVE?
  5. Asset Criticality, how important is the affected asset?
  6. Public Exposure, is the asset internet-facing?
  7. BASzy Validation, was exploitability proven by attack simulation?

TRIS produces a score from 0-95 and assigns a priority band:

Compliance Mapping

CVEasy maps every CVE to 86 controls across 9 compliance frameworks:

Supported Scanner Formats

CVEasy accepts exports from all major vulnerability scanners. Upload the file and format is auto-detected. Supported: Nessus, Qualys, Rapid7 InsightVM, OpenVAS/GVM, Nuclei, Burp Suite, OWASP ZAP, Aqua Trivy, and generic CSV (any scanner that exports CSV).

Keyboard Shortcuts

⌘KOpen search
⌘JOpen AI chat
⌘/Toggle sidebar

Attack Surface Canvas

The Live Attack Surface Canvas is an interactive network visualization that shows your entire infrastructure in one view. It is a proprietary feature unique to CVEasy AI, no other CTEM platform offers this.

How to Access

Navigate to Attack Surface in the sidebar. Click Network Map at the top right to switch from table view to the interactive canvas.

Understanding the Canvas

Interacting with the Canvas

Node Badges

AutoFuzz Engine

AutoFuzz is CVEasy AI's proprietary zero-day discovery engine. Unlike static attack libraries, AutoFuzz takes known payloads and generates novel variants using 37 mutation strategies. When a mutation bypasses a defense that blocked the original payload, that's a zero-day-class discovery unique to your environment.

How It Works

  1. BASzy fires a known attack payload at a target (e.g., ' OR 1=1--)
  2. If the payload is BLOCKED by a WAF/EDR, AutoFuzz activates
  3. AutoFuzz generates encoded variants: URL encoding, Unicode escapes, HTML entities, null byte injection, comment injection, case swapping, and more
  4. Each variant is tested against the same target
  5. If a variant bypasses the defense, it's classified as a zero-day bypass and stored in the Zero-Day Vault

Mutation Strategies

AutoFuzz includes 37 strategies organized into categories:

Strategy Chaining

AutoFuzz automatically chains strategies (e.g., URL-encode + case-swap + comment-inject) to discover multi-layer bypasses that single-strategy approaches miss.

Remediation Proof Engine

The Remediation Proof Engine provides auditable evidence that your fixes actually worked. No other security platform offers closed-loop verification like this.

How It Works

  1. Before: BASzy finds a vulnerability (UNDETECTED) and stores a baseline snapshot, the exact attack, payload, and evidence
  2. Fix: You apply the remediation (CVEasy AI generates the exact commands)
  3. After: Click "Verify Fix". BASzy re-runs the same attack with the same payload
  4. Proof: The engine compares before and after: UNDETECTED -> BLOCKED = VERIFIED

Proof Reports

Each verification generates an auditable proof containing:

Dashboard

The Remediation Proof Dashboard shows total proofs generated, verification success rate, breakdowns by asset and MITRE technique, and a list of pending baselines awaiting verification.

Detection Rule Export

When BASzy proves an attack bypasses your defenses, CVEasy AI automatically generates detection rules to catch it. Rules are generated in 6 formats:

FormatSIEM/ToolUse Case
SigmaUniversal (any SIEM)Portable rules that translate to any platform
SPLSplunkDirect Splunk search queries
KQLMicrosoft SentinelAzure Sentinel analytics rules
EQLElastic SIEMElastic event query language
CQLCrowdStrike LogScaleFalcon LogScale queries
SuricataSuricata/Snort IDSNetwork-level IDS rules

How to Export

After a BASzy campaign completes, go to the findings page. Each UNDETECTED finding has an "Export Detection Rules" button that generates rules in all 6 formats. Copy and paste directly into your SIEM.

SIEM Integration

CVEasy AI can push findings, alerts, and detection rules to your existing security tools:

IntegrationProtocolWhat It Sends
SplunkHEC (HTTP Event Collector)Findings, alerts, detection rules
Microsoft SentinelLog Analytics APIFindings as custom log type
Elastic SIEMElasticsearch APIFindings as indexed documents
CrowdStrikeLogScale Ingest APIProcess, file, and network events
ServiceNowIncident Table APIAuto-creates incidents from findings
SlackWebhookRich alert messages with MITRE mapping
Microsoft TeamsWebhookMessageCard alerts
SyslogRFC 5424 (UDP/TCP)Standard syslog messages
Generic WebhookHTTP POSTJSON payload to any endpoint

Configuration

Go to Settings -> Integrations to configure your SIEM connections. Each integration requires:

Posture Scoring

CVEasy AI calculates a composite security posture score (0-100) from your BASzy results, weighted across 6 categories:

CategoryWeightWhat It Measures
Endpoint Security25%EDR detection rate, AV effectiveness
Network Controls20%Segmentation, firewall rules, IDS effectiveness
Identity Security20%Credential hygiene, MFA enforcement, privilege management
Data Protection15%Encryption, DLP controls, exfiltration prevention
Resilience10%Backup integrity, recovery capability
Visibility10%Logging coverage, monitoring, alerting

Grading

A = 90+, B = 80-89, C = 70-79, D = 60-69, F = below 60. Industry benchmarks are included for comparison (healthcare avg: 58, financial: 72, technology: 68, government: 55).

Ransomware Readiness Assessment

A dedicated assessment that tests your defenses against each phase of the ransomware kill chain:

  1. Initial Access Prevention, phishing detection, exposed service patching
  2. Execution Controls, script blocking, macro restrictions, application whitelisting
  3. Credential Protection. LSASS protection, MFA enforcement, credential rotation
  4. Lateral Movement Controls, network segmentation, admin share restrictions, SMB controls
  5. Discovery Detection, network scan alerting, AD enumeration detection
  6. Data Protection. DLP policies, staging detection, encryption at rest
  7. Exfiltration Prevention. DNS filtering, outbound monitoring, proxy enforcement
  8. Encryption Defense, ransomware behavior detection, file integrity monitoring
  9. Recovery Capability, backup integrity, offline backups, recovery time objectives
  10. C2 Detection, beacon detection, DNS tunnel identification, proxy enforcement

Each phase is scored and produces specific recommendations. Overall readiness levels: READY (80+), PARTIAL (60-79), AT RISK (40-59), CRITICAL (below 40).

System Requirements

ComponentMinimumRecommended
ProcessorApple M1Apple M2 Pro / M3 Pro or later
Memory16 GB unified36-64 GB unified
Storage15 GB free30 GB free (for scan data growth)
macOSmacOS 13 VenturamacOS 14 Sonoma or later
NetworkNot required (air-gap capable)LAN access to scan targets
Display1440x900Retina display

What's Included in the DMG

No Homebrew, Docker, Python, or cloud accounts needed. Everything runs from the app bundle.

Troubleshooting

App opens but shows a blank white screen

The backend server may still be starting. Wait 10-15 seconds for the AI engine to initialize. If the screen stays blank, check Console.app for errors from "CVEasy AI". Try quitting and reopening the app.

AI remediation is slow or not generating

The AI engine requires Apple Silicon (M1/M2/M3/M4) with Metal GPU acceleration. On 16 GB machines, the first generation may take 30-60 seconds as the model loads into GPU memory. Subsequent generations are faster (10-15 seconds). If generation fails completely, check that no other GPU-intensive apps are running.

BASzy scans find nothing

Check that: (1) Your target network is reachable from the machine running CVEasy AI. (2) EDR/firewall isn't blocking BASzy's scan traffic. (3) You've whitelisted CVEasy AI in your EDR. Try importing scan data from an existing scanner first to verify the pipeline works.

"Port already in use" error on startup

Another instance of CVEasy AI may be running. Quit all instances and try again. If the issue persists, run lsof -i :3001 in Terminal to find what's using the port, then kill [PID] to stop it.

Scanner import fails or shows 0 CVEs

Verify your scan file format is correct. CVEasy expects: Nessus (.nessus XML), Qualys (XML), Rapid7 (XML), OpenVAS (XML), Nuclei (JSON), Burp (XML), ZAP (JSON/XML), Trivy (JSON), or CSV with columns: ip, hostname, cve_id, port, severity. Check that the file isn't empty or corrupted.

License activation fails

License keys follow the format BTA-XXXX-XXXX-XXXX-XXXX. Ensure you're entering the key exactly as provided (case-sensitive). If your machine was recently reimaged or the hardware changed, contact sales@cveasyai.com for a key reset.

App crashes on macOS Sequoia

Ensure you're running the latest version of CVEasy AI. If the crash persists, right-click the app in Finder, select "Get Info", and ensure "Open using Rosetta" is NOT checked (CVEasy AI is native Apple Silicon). Report persistent crashes to support@cveasyai.com with the crash log from Console.app.

EDR Whitelisting

BASzy performs authorized security testing that may trigger EDR/AV alerts. Whitelist the following before running attack simulations:

/Applications/CVEasy AI.app/Contents/MacOS/cveasy-ai
/Applications/CVEasy AI.app/Contents/MacOS/cveasy-server
/Applications/CVEasy AI.app/Contents/MacOS/llama-server
/Applications/CVEasy AI.app/Contents/MacOS/baszy-server

Detailed instructions for CrowdStrike Falcon, SentinelOne, Microsoft Defender, Carbon Black, and Sophos are available in our EDR Whitelisting Guide.

Frequently Asked Questions

Does CVEasy AI need internet access?

No. CVEasy runs 100% offline. The AI engine, CVE database (328,000+ CVEs), and all features work without internet. When online, it automatically syncs new CVEs from NVD, but this is optional.

Can I use my existing Nessus/Qualys scans?

Yes. Upload your scan files directly. CVEasy supports 9 scanner formats including Nessus (.nessus), Qualys XML, Rapid7 XML, OpenVAS, Nuclei, Burp Suite, ZAP, Trivy, and generic CSV. Assets are auto-created and CVEs auto-linked.

What if I don't have a vulnerability scanner?

You don't need one. BASzy's built-in discovery engine scans your network, identifies assets, fingerprints services, and tests for vulnerabilities, all without external tools.

How is TRISβ„’ different from CVSS?

CVSS measures technical severity. TRISβ„’ measures actual risk by combining 7 signals: CVSS, EPSS (weaponization probability), CISA KEV (active exploitation), threat actor targeting, asset criticality, public exposure, and BASzy validation (proven exploitability). A CVSS 7.5 that's being actively exploited by APT29 against your industry scores much higher than a CVSS 9.0 that's theoretical.

Is BASzy safe to run in production?

BASzy respects authorization levels. In "low_impact" mode (default), all tests are non-destructive, they detect vulnerabilities without exploiting them. Aggressive testing requires explicit authorization and is designed for dedicated test environments.

How do I back up my data?

Go to Settings β†’ Backup β†’ Create Backup. The backup includes your entire CVE database, scan history, asset inventory, findings, and configuration. Download the backup file to external storage for disaster recovery.

What hardware do I need?

Mac with Apple Silicon (M1/M2/M3/M4) and 16GB+ unified memory. Recommended: 36-64GB for the best AI performance. Apple Silicon (M1/M2/M3/M4) is required for the built-in AI engine.

Can multiple people use one installation?

Yes. CVEasy runs as a web application on your local network. Anyone on the same network can access it via browser at the server's IP address. Enterprise licenses support unlimited concurrent users.

How do I update CVEasy AI?

Download the latest DMG from your account and install over the existing application. Your database and settings are preserved, they're stored in ~/Library/Application Support/CVEasy AI/, not inside the app bundle.

What compliance frameworks are supported?

CVEasy maps to 86 controls across 9 frameworks: HIPAA, PCI-DSS v4.0, SOC 2 TSC, ISO 27001:2022, NIST CSF v2.0, CIS Controls v8, FedRAMP (NIST 800-53), GDPR, and CCPA. Each CVE shows which compliance controls it threatens.

Will BASzy trigger my EDR/antivirus?

It might, that's actually the point. BASzy tests whether your security controls detect attack techniques. If your EDR blocks a BASzy test, that's a PASS. If it doesn't, that's a gap to fix. For smooth operation, whitelist CVEasy AI in your EDR before running campaigns.