Phoenix Security
  • Home
  • Vuln Intelligence
    • CVE Search
    • Trending
    • Phoenix Intelligence
    • Threat Actors
    • Threat Analytics
    • Source Intelligence
    • Exploit Intelligence
    • ENISA EUVD
    • 0-Day Monitoring
    • Malware Intel
  • Yearly Analysis
  • CNA
    • CNA Intelligence
    • Name Matching
  • Products
    • Product Intelligence
    • Vendor Lookup
    • Product Lookup
    • EOL Intelligence
    • Library Intelligence
    • Package Lookup
    • License Intelligence
    • Firewall Management
    • Firewall Audit Log
    • Firewall Approvals
    • CPE Analysis
  • CWE
    • CWE Analysis
    • OWASP Top 10
    • CWE Top 25
    • KEV CWE
  • Scoring
    • CVSS
    • EPSS
    • KEV
  • Growth
    • NVD Status
  • Calendar
  • Patch
Sign In Register Dashboard

Authentication Required

0-Day Monitoring requires authentication to track repositories using your personal LLM keys.

For organization-wide monitoring with admin credentials, visit 0-Day Admin.

0-Day Monitoring

EXPERIMENTAL
Monitor repositories using your personal LLM keys | Admin 0-Day for org-wide monitoring
This is an experimental function. Results may not be accurate - please double-check the logic and findings before taking action.

Daily LLM Budget

Tracks your AI analysis spending

Spent: $0.00 Remaining: $1.00 Limit: $1.00/day
0
Monitored Repos
0
Active
0
Vuln Patches Found
0
Unreviewed
0
Total Findings
$0
Cost Today
Vulnerability Patch Findings
0 selected

No findings yet

Add repositories to start monitoring for vulnerability patches

My Monitored Repositories

Behavior guide: Live PR / Historical / Full Repo specification

No repositories monitored

Click "Add Repository" to start monitoring

Scan Pull Request

Analyze any GitHub pull request for potential security vulnerability patches. Works with both public and private repositories (requires GitHub token for private repos).

Full GitHub repository URL

The PR number (e.g., #123)

Select which AI provider to use for analysis

Analysis Result

Private Repository Access

To scan private repositories, add your GitHub token in the Central DB → Admin Settings section.

Admin-Recommended High-Risk Packages

These packages have been identified as high-risk based on vulnerability history, exploitation evidence, and enterprise impact. Subscribe to receive alerts when patches are detected.

No recommended packages available

Administrators will add high-risk packages here

GitHub Authentication

Connect your GitHub account to scan private repositories and pull requests. Your token is encrypted and stored securely.

Checking GitHub connection...

Add GitHub Personal Access Token

Create a Personal Access Token with repo scope for private repository access.

Your token will be encrypted before storage

Connected
repo access
Connected
Rate Limit Remaining: -
Private Repo Access: -
GitHub OAuth (Coming Soon)
PLANNED

One-click GitHub OAuth authentication will be available in a future update, providing a more seamless connection experience without manual token management.

Alert Notifications

Configure email and Slack notifications for budget alerts and vulnerability findings.

Email Notifications

Slack Notifications

Create a webhook in your Slack workspace settings

Budget Alerts

Vulnerability Alerts

Only alert on vulnerabilities at or above this severity level

Scan & Repository Alerts

Alert Frequency

Quiet Hours

Alert History

No alerts sent yet

Central Vulnerability Database

Community-contributed vulnerability findings from public/OSS repositories. Findings from organization and personal repos are NOT included here.

0
Total Vulnerabilities
0
Verified
0
Critical
0
High

No vulnerabilities in central database yet

Add public/OSS repositories to start contributing

Industry Vulnerability Trends

Aggregated vulnerability type statistics from organization repositories (anonymized).

No industry statistics available

Add organization repositories with industry classification to contribute

Admin Settings

Configuration previously under the standalone Settings tab is managed here.

Add Repository to Monitor

Personal: 0/5
Public/Org: 0/50
Standard User

Enter the full GitHub repository URL

Public/OSS: Findings shared to central vulnerability database for community intelligence
Organization: Findings private, but vulnerability types tracked by industry
Personal: Completely private, not tracked (max 5 repos)

Name of your organization (for internal tracking)

Industry classification for vulnerability trend analysis

Select which AI provider to use for analysis

Comma-separated list of branches

Budget Settings

Maximum amount to spend on AI analysis per day

Finding Details

Data Sources:

National Vulnerability Database (NVD)
CVE Program
Last updated: Loading...

Phoenix Security:

About Phoenix Security
Threat Centric Approach
About This Platform

Special Thanks to Our Data Partners

Shadowserver - Exploitation Data VulnCheck - KEV & Exploits CISA - KEV Catalog OWASP - Top 10 MITRE CWE FIRST - EPSS endoflife.date - EOL Data

© 2026 Phoenix CVE Intelligence • Built by Phoenix Security
Data updated every hour • CVE coverage: 1999-2026