Admin Dashboard
Manage users, registrations, and platform settings
CVE public elaboration
User-triggered refreshes share a global daily cap (see envCVE_ELABORATED_REFRESH_DAILY_CAP).
| Time (UTC) | CVE | Kind | Triggered by |
|---|---|---|---|
| Loading… | |||
Pending Registrations
| User | Organization | Team Size | Source | Tier | Submitted | Actions |
|---|---|---|---|---|---|---|
|
Loading...
|
||||||
All Users
| User | Organization | Tier | Status | Source | Registered | Actions |
|---|---|---|---|---|---|---|
|
Loading...
|
||||||
Create New User
Reset User Password
Admin Audit Log
| Timestamp | Admin | Action | Target User | Details |
|---|---|---|---|---|
|
Loading...
|
||||
Webhook Configuration
Add New Webhook
| Name | Type | URL | Events | Triggers | Actions |
|---|---|---|---|---|---|
|
Loading...
|
|||||
API Key Management
Generate New API Key
PAI (Internal) Key Management
API Resources
Data Shield Guard Telemetry
| Event | Endpoint | IP | Count | TTL (s) |
|---|---|---|---|---|
| No telemetry yet. | ||||
Your API Keys
| Name | Key Prefix | Scope | Created | Expires | Usage | Status | Actions |
|---|---|---|---|---|---|---|---|
|
Loading...
|
|||||||
AI Feedback Review
| CVE ID | Section | Rating | Reasons | Comment | User | AI Source | Submitted |
|---|---|---|---|---|---|---|---|
|
Loading feedback data...
|
|||||||
Section Performance
0-Day Admin Monitoring
EXPERIMENTALConfigure organization-wide 0-day monitoring. Recommended repos are scanned using admin LLM credentials and findings are shared with all subscribers. Personal Monitoring allows users to add their own repos with personal keys.
Global Settings
NPM Malicious Package Scanner
Control which npm packages and patterns are monitored by the malicious package scanner.
Recommended High-Risk Packages
| Package | Repository | Ecosystem | Risk Score | Vulns | Subscribers | Actions |
|---|---|---|---|---|---|---|
|
Loading recommended packages...
|
||||||
Pipeline Configuration
Integrations
nlm CLI. Creates notebooks with sources and generates podcasts automatically.How to Grant User Access
- Go to Google Cloud Console → IAM
- Select your NotebookLM Enterprise project
- Click Grant Access
- Enter user email in "New principals"
- Select role:
Cloud NotebookLM User - Click Save
- Go to Gemini Enterprise page
- Click Manage users under NotebookLM Enterprise
- Add user email and assign subscription license
- Or enable automatic license assignment
- Go to Gemini Enterprise → Manage under NotebookLM Enterprise
- Copy the unique NotebookLM Enterprise URL
- Share with users who need access
Grant Vertex AI API Access (Media Generation)
roles/aiplatform.user role.
PROJECT_ID- Your GCP project ID (e.g.,vulndb-486619)user@example.com- Email of the user to grant accessroles/aiplatform.user- Grants access to deploy models, run predictions, and use Vertex AI services
- Go to IAM & Admin → IAM
- Click Grant Access
- Enter user email in "New principals"
- Select role:
Vertex AI User(or search foraiplatform.user) - Click Save
GCP Service Account Credentials
How to create a service account?
- Go to GCP Console → IAM → Service Accounts
- Click Create Service Account
- Name it (e.g., "phoenix-vuln-weekly")
- Grant roles:
Vertex AI User,Cloud NotebookLM User - Click Done, then click on the service account
- Go to Keys tab → Add Key → Create new key → JSON
- Download the JSON file and upload it here
| Domain | Category | ADQE | Final Score | Boost | References | Trust | Actions |
|---|---|---|---|---|---|---|---|
| Loading source domains... | |||||||
Recent Audit Log
| Time | Domain | Action | Field | Change | Reason |
|---|---|---|---|---|---|
| Loading audit log... | |||||
ADQE Scoring & Trust Levels Reference
ADQE Score Components
Formula: ADQE = A + D + Q + E (max 100)
Reliability Levels
Trust Levels
High Trust: Official vendor PSIRTs, government agencies (CISA, NIST), verified CNAs. Authoritative for their products.
PoC Source: Domains publishing proof-of-concept exploit code (GitHub, Exploit-DB). Valuable for exploitation intel.
Standard: General security research, news, community sources.
Admin Actions
Boost/Downvote: Manually adjust final score (+/- points). Recorded in audit log.
Edit: Change category, trust level, or add notes.
Rebuild: Re-aggregate reference counts from all sources (NVD, Advisory, GitHub, KEV).
Scoring Weights
PS-HP Weights
PS-OSS Weights
PS-HP Evidence Model
CPE Mapping
| Canonical | CPE Vendor/Product | CPE URI | Status | Updated | Actions |
|---|---|---|---|---|---|
|
Loading...
|
|||||
Platform Logs
Search platform, authentication, ops, and security logs (global admin). For data-updater script output (npm rate limits, progress), use the Execution Logs tab.| Timestamp | Category | Source | Level | Action | Actor | Target | Message |
|---|---|---|---|---|---|---|---|
| Open this tab to load logs. | |||||||
Data source health
Cache markers and checkpoint-derived freshness (admin ops API).
Last updated: -
| Source | Status | Last success | Age (min) | Records | Watermark |
|---|---|---|---|---|---|
|
Loading data sources… |
|||||
Recent runs
Recent entries from allowlisted checkpoint files (limit=50).
Last updated: -
| Run ID | Domain | Source | Status | Started | Completed | Duration | Error |
|---|---|---|---|---|---|---|---|
|
Loading process logs… |
|||||||
Run execution logs
Select a run above to load detailed execution logs.
Execution logs
Tail ofprocess_update.log / updater logs (npm rate limits, progress, script output). Global admin only.
| Time (UTC) | Level | Message |
|---|---|---|
| Open this tab to load execution logs. | ||