Attack Surface Snapshot
This report provides an exposure-oriented view of the scan results:
port concentration (by hosts and by rows)
protocol split (TCP/UDP/unknown)
TLS vs cleartext/unknown indicators
“hotspots” (assets with high Sev4+ on ports and high port diversity)
Output
Per scan:
output/<scan_name>/attack-surface.html
Optional model artifact (only when metadata export is enabled):
output/<scan_name>/attack_surface_model.json
Model JSON is written when
notifications.include_run_metadata: true.
How to generate
CLI:
miyabi-qualys-ai-triage-pack run --config config/config.yamlConfiguration
Enable/disable:
reports.attack_surface.enabled: true|false
UI options:
reports.attack_surface.ui.enable_filtersreports.attack_surface.ui.max_rows_render
Optional LLM narrative (guardrailed / JSON-only):
reports.attack_surface.llm.enabledreports.attack_surface.llm.modelreports.attack_surface.llm.max_items_for_llm
Data sources (Qualys CSV fields)
Primary:
Port,Protocol,SSLSeverity,QID,Titleasset identifiers:
FQDN/DNS/NetBIOS/IP