Global Intel
What exists in the world: CVEs, exploits, KEV, EPSS, Nuclei templates, CSAF, ATT&CK.
CVEWatcher installs on your Linux server, understands the real environment, navigates approved security tools, builds its own schedule, and updates the dashboard with evidence — kernel, processes, ports, cron, systemd, packages, containers and logs. The scenarios shown here are examples; the agent adapts its plan to each customer environment.
Public feeds tell you what exists in the world. CVEWatcher tells you what is real on your server: what is installed, what is running, what is exposed, what changed, and what should be re-checked next — with evidence.
What exists in the world: CVEs, exploits, KEV, EPSS, Nuclei templates, CSAF, ATT&CK.
What exists on your server: running processes, open ports, installed packages, cron drift, kernel reboot gap.
Is it actually dangerous here, what to re-check, who gets the alert, and what the runbook should be.
Production / staging, scan intensity, quiet hours, customer policy.
Docker? Public SSH? Exposed nginx? cron drift? cPanel hosting?
The agent builds a task plan from approved tools — never random shell.
Safe / deep checks at the right time, with timeouts and resource limits.
Adds re-checks when new KEV / change / risk shows up.
Every tool has metadata: production safety, root requirement, cost, when to run, how to parse output, and what it produces. The AI requests a tool — it never writes raw shell.
uname, os-release, dpkg/rpm, systemctl, journalctl, ss, iptables / nftables / ufw, crontab, ps, lsof, sudoers.
Lynis, OpenSCAP, osquery, auditd, fail2ban status, CIS-style checks.
Trivy, Grype, Syft, Docker CLI, compose inventory, privileged containers, docker.sock mounts.
Nuclei templates in controlled mode, ExploitDB / GitHub PoC metadata, Metasploit metadata — exploits are not executed in Phase 1.
NVD, CVEProject, CISA KEV, FIRST EPSS, OSV, GHSA, CSAF, plus optional CVE intelligence providers via REST / MCP.
Falco, auditd rules, osquery scheduled queries, eBPF sensors — for Enterprise tiers.
We do not throw twenty cron jobs at your server. The architecture is one systemd service + timer, a PostgreSQL-backed scheduler and evidence layer, and policies that decide what runs and when. Cron is only a fallback or per-customer request.
▸ Docker detected → daily Trivy + exposed-container port diff ▸ New public port → immediate process / package / CVE lookup ▸ CISA KEV match → exposure verification + recheck every 6h ▸ Kernel update pending reboot → maintenance reminder + aging counter ▸ New root cron → drift alert + permission / path check
▸ Safe Mode — read-only, low-cost, production friendly ▸ Deep Mode — Lynis / Trivy / OpenSCAP during quiet hours ▸ Runtime Watch — auditd / Falco / eBPF for Enterprise ▸ Approval Required — Nuclei validation only if allowed ▸ Resource Limits — max CPU / time per scan
Every finding is connected to a tool, a command, a timestamp, and a next check. No black boxes.
Every finding answers: what happened, why it is urgent, what is the evidence, what could happen if ignored, and what to do now. Not just CVSS. Not just raw logs.
“Your server needs a reboot because a security kernel update was installed but is not yet loaded. The old kernel is still running.”
Explains urgency — KEV match, internet-exposed service, running process, public exploit, suspicious cron / systemd change.
For every finding: the command / tool / log, what was checked, what was found, timestamp, confidence and a redacted raw output link.
CVEWatcher stores the Cyber Twin in PostgreSQL: server profile, environment detection, allowed tools, scheduled tasks, runs, findings, evidence, timeline, logs, customer preferences and AI explanation cache. That is what makes memory, diff, audit, fleet visibility and enterprise-grade reporting possible.
Environment: cPanel / Docker / DB / generic profile + confidence Tasks: what runs, when it ran, when it runs next, why Findings: severity, urgency, status, next check Evidence: command / tool / log summaries + redacted raw refs Timeline: changes, alerts, resolved events
Business owner: status, top 3 actions, plain explanation Admin: findings queue, evidence cards, runbook Expert: JSON, raw refs, version logic, advisory sources
Instead of “there is a CVE”, the customer sees a clear story: 02:00 package check ran → 02:03 kernel update found → 02:04 reboot required confirmed → 02:05 nginx still running an old library → 02:06 alert sent → next check in 6 hours.
CVEWatcher must be effective even with root access. So it ships with permission modes: Safe Observer, Root Expert, Root Operator and Break-glass. The goal is not to block power — it is to make full power safe with audit, policy, reasons, timeouts and evidence.
Default for cautious customers: read-only inventory, CVE correlation, drift detection, alerts — no changes.
For hosting companies and sysadmins: root visibility, deep scans, log access, systemd timers, strong diagnostics.
For customers who want action: remediation workflows, service restart, package updates, firewall changes — all with policy, approval and full audit.
Intent: AI or user requests a structured action Policy: allowlist + customer policy + resource budget Tool: fixed schema + command wrapper Parser: normalized, redacted output Evidence: stored in PostgreSQL, synced to dashboard
Default: no inbound public port Sync: agent initiates outbound HTTPS only Local API: Unix socket or 127.0.0.1 only Dashboard: signed policy messages, never shell Tokens: rotation + request signing
If your server already has popular security tools, CVEWatcher does not replace them. It becomes the brain on top: it reads events, understands what was blocked, what is still exposed, and produces a short investigation with evidence and a customer-friendly explanation.
CSF posture, LFD blocks, brute-force, suspicious process, port scan alerts, allowed ports, testing mode, firewall posture.
Malware detections, quarantine / clean status, Proactive Defense, WAF incidents, reputation events, affected account / domain, last scan health.
Explains WAF hits, blocked exploit attempts, failed WHM / cPanel logins, banned IPs, targeted users — and whether it is normal noise or a real incident.
1. Identify account / domain / path 2. Check whether the file still exists or is in quarantine 3. Inspect modified time, owner, permissions 4. Check whether the file is web-accessible 5. Create finding + evidence + follow-up recheck
1. Identify the service: SSH / cPanel / Exim / Dovecot 2. Count attempts over time 3. Check whether the IP is blocked 4. Inspect root login / password auth / cPHulk 5. Decide: ambient noise or urgent incident
Old antivirus says: “I found a bad file.”
CVEWatcher says: Imunify360 found a suspicious file in this account, CSF blocked related attempts, the exposed service is X, the evidence is here, the risk is still open / closed, and the next check runs in Y hours. That is detection + context + investigation + explanation + follow-up.
cPanel / WHM is not a Docker host. A database node is not a web host. The examples below are not hard-coded limits; they show how CVEWatcher navigates reality. It detects the environment, selects a Protection Profile, adapts the schedule, chooses the right tools, and explains the configuration in plain language.
Detects cPanel, Apache / LiteSpeed, Exim, Dovecot, MySQL, DNS, PHP versions, AutoSSL, ModSecurity, cPHulk, CSF / Imunify if present — then prioritizes hosting-specific risk.
Detects containers, images, exposed ports, privileged containers and docker.sock mounts — then schedules container checks in the right window.
Detects DB services, bind addresses, firewall posture, package CVEs, users / sudo, kernel state, backup indicators and runtime signals — then adapts policy accordingly.
Web: Apache / LiteSpeed / Nginx reverse proxy PHP: multiple versions, handlers, EOL versions Mail: Exim, Dovecot, SMTP restrictions Panel: cpsrvd, cpdavd, cPanel version / update tier Sec: ModSecurity, cPHulk, CSF / LFD, Imunify / ClamAV
Hourly: ports / process diff + cron / systemd drift 2h: CISA KEV + EPSS sync Daily: package security + cPanel / EA4 / PHP EOL checks Nightly: lightweight webroot metadata scan Weekly: Lynis / hardening deep scan
The next major security platform will not be defined by another vulnerability feed. It will be defined by who owns the runtime context: what is installed, what is exposed, what changed, what evidence proves it, and which workflow should happen next. CVEWatcher starts with the hardest source of truth — the server itself — and expands from local evidence into fleet intelligence, security graph, AI SOC workflows and autonomous remediation.
Start where urgency is highest: Linux, VPS, hosting and cPanel servers that need local evidence, not another alert queue.
Every run improves the system: exposure truth, tool reliability, patch outcomes, environment patterns and customer-specific risk memory.
The same Cyber Twin can power fleet security, compliance evidence, SOC workflows, remediation, cloud posture and partner integrations.
Wedge: local Linux evidence where CVE noise hurts most Moat: real exposure data + tool outcomes + patch history Expansion: single server → fleet graph → AI SOC workflows Buyer: hosting providers, MSPs, infra teams, security teams Category: autonomous security runtime for infrastructure
Phase 1: Linux / VPS / cPanel autonomous cyber expert Phase 2: Fleet-wide Cyber Twin + security graph Phase 3: AI SOC workflows, tickets and executive reporting Phase 4: Cloud, Docker, Kubernetes and compliance evidence Phase 5: Marketplace, API, MCP and partner ecosystem
CVEWatcher is building the runtime evidence layer for modern infrastructure security. The first product is an autonomous Linux cyber expert that knows which security tool to run and when. The long-term platform is a fleet-wide AI Cyber OS that turns server reality into prioritized action, defensible evidence and automated security operations.
CVEWatcher is built and maintained by Netanel Siboni — an AI implementation expert with 19+ years of production infrastructure experience. Founder of Voxfor and Netpower, he has personally operated and secured thousands of Linux servers and applications since 2006, and now applies that operator-grade depth to autonomous cyber agents.
CVEWatcher is the security agent born inside that experience: built by someone who has been running real servers under real attack for nearly two decades. Not another CVE feed. Not another dashboard. A tool-aware, environment-adaptive cyber agent built from production reality.
CVEWatcher is a commercial product. It is not open source. To explore a partnership, investor conversation or a private walkthrough — schedule a meeting on Netanel's calendar, or reach out by email or LinkedIn.
For investor conversations, business proposals, partnerships or a private product walkthrough, the fastest path is to grab a slot directly on Netanel's calendar. Email and LinkedIn are also welcome.
Open Netanel's calendar and pick a time that works for you. 30 to 60 minutes, no friction.
Open calendar ↗Please include who you are, your company, the reason for contact, and the type of meeting or proposal.
[email protected]For business introductions, investor conversations, and professional follow-up.
Contact on LinkedIn ↗