πŸ•ΈοΈ Ada Research Browser

TODO_REDTEAM.md
← Back

Red Team Scan Findings β€” Alfred Server

Scan Date: 2026-03-07 Scanner: Cyber-Guardian Red Team (cyber-guardian project) Scope: Alfred server β€” all categories except wordpress, cloud, ai Run 1: localhost:80 β€” infrastructure, api, compliance, cve, malware, secrets Run 2: https://8qdj5it341kfv92u.brandonquig.com β€” web, exposure, dns (real TLS + auth layer) Total Findings: 112 localhost + 14 FQDN-specific (24 CRITICAL, 36 HIGH, 45 MEDIUM, 6 LOW, 1 INFO)

FQDN Scan Corrections vs Localhost Scan


CRITICAL Priority

[INFRA] No Firewall Active

[SECRETS] Hardcoded Secrets in Source Code

[API] Auth Bypass β€” 404 Instead of 401

[COMPLIANCE] PCI Default-Deny Not Enforced

[CVE] Nginx 1.24.0 β€” Critical CVEs Flagged


HIGH Priority

[INFRA] SSH Password Authentication Enabled

[INFRA] File Permission Issues β€” PARTIALLY CLEARED

[INFRA] PostgreSQL Port 5432 Publicly Accessible β€” CLEARED

[INFRA] Unnecessary Services: NetBIOS (139) + SMB (445) β€” CLEARED

[API] CSRF Tokens Too Short

[COMPLIANCE] Unencrypted Backups (HIPAA)

[COMPLIANCE] No Account Lockout / Rate Limiting

[COMPLIANCE] PCI Logging Incomplete

[COMPLIANCE] Weak Crypto β€” IDEA Algorithm in Use

[COMPLIANCE] No MFA on Password Reset

[DNS] Email Auth Records Missing

[EXPOSURE] Admin Panels β€” CLEARED (FQDN verified)

[EXPOSURE] PHP Version Disclosure (NEW β€” FQDN scan)

[EXPOSURE] README.md Accessible on FQDN

[COMPLIANCE] 90 External Resources Without SRI

[CVE] Nginx HIGH CVEs (CVSS 8.x)


MEDIUM Priority

[API] No Rate Limiting on API Endpoints

[API] Server Identity Exposed in Error Responses

[WEB] TLS/HTTPS Issues

[WEB] Missing Security Headers

[WEB] External Scripts/Styles Without SRI

[COMPLIANCE] CUI Cache Headers Missing

[DNS] DNSSEC Not Enabled

[CVE] Nginx MEDIUM CVEs


LOW Priority


Affected Projects / Services

Project Findings
Server (nginx, system) Firewall, nginx CVEs, SSH, file perms, SMB services
finance-manager API auth bypass (404 vs 401), CSRF token entropy, rate limiting
Keystone / nginx auth Default-deny not enforced, session cookie flags, security headers
All projects (secrets) 465 API keys, 149 passwords, 8 private keys in source
eqmon Encryption key weak permissions (usmmi_A735.key)
ecoeye-alert-relay Hardcoded secrets in config (flagged by source scan)
photo-catalog External resource SRI
mediamtx Port 1935/8554/8888/8889 exposed β€” review if intended

Report generated from Cyber-Guardian red team scan run 2026-03-07