Findings & Assets#
When APHIDS runs in online mode, scan results are parsed into structured findings and assets stored in the Hive graph database.
Assets#
Assets are infrastructure components discovered during scans:
| Asset Type | Examples |
|---|---|
| URL | https://example.com/login |
| Site | example.com |
| Host | web-server-01 |
| IP | 203.0.113.50 |
| Port | 443/tcp |
| DNS | A record: example.com → 203.0.113.50 |
| Application | Apache 2.4.52, WordPress 6.4 |
Assets are deduplicated across scans — scanning the same target multiple times enriches the existing asset rather than creating duplicates.
Asset Relationships#
Assets are connected in the graph:
Site: example.com
├── DNS: A → 203.0.113.50
│ └── IP: 203.0.113.50
│ └── Port: 443/tcp
├── URL: /login
├── URL: /api/v1
└── Application: Apache 2.4.52
Submitting Assets via MCP#
In MCP mode with Hive, submit assets directly:
"Submit these discovered assets: example.com resolves to 203.0.113.50,
running Apache 2.4.52 on port 443"
The submit_assets MCP tool accepts URLs, IPs, domains, ports, and applications.
Findings#
Findings are individual results from security tools, linked to the assets they affect:
- Scanner output — Raw findings from nmap, nuclei, nikto, etc.
- Severity levels — Critical, High, Medium, Low, Info
- Evidence — Tool output, screenshots, request/response data
- Deduplication — Similar findings are merged across scans
Finding to Vulnerability#
Findings can be promoted to vulnerabilities for formal tracking:
- Review findings in the Hive UI
- Promote to vulnerability (manual or via Threat Insights)
- Enrich with CVE/CVSS/EPSS data
- Track remediation status
- Include in reports
Submitting Findings via MCP#
In MCP mode with Hive, submit custom findings:
"Submit a finding: SQL injection vulnerability found at
https://example.com/api/users?id=1, severity high,
CVE-2024-12345"
The submit_findings MCP tool accepts name, risk level, description, URL/host, CVE, CWE, CVSS, and evidence.
AI Enrichment#
When findings are uploaded, the Hive post-processor automatically:
- Generates LLM summaries — Claude summarizes scan results
- Infers threats — AI identifies patterns like exposed admin panels, EOL software, weak crypto
- Correlates findings — Links related findings across different tools and scans
- Calculates risk scores — Composite scoring based on vulnerability severity and count
These enrichments appear in the Hive dashboard as Threat Insights with confidence scores and remediation recommendations.