This project is a Quarkus + React web application implemented to interact with ExploitIQ service for sending requests to evaluate vulnerabilities on specific SBOMs.
For product documentation and deeper context, see the Exploit Intelligence documentation.
Check this other documents for:
- Configuration
- Development
- Tests — REST
@QuarkusTestnotes and CI test image for pipelines
On the Home page, you will find a central dashboard designed to manage your exploitability analysis workflow and monitor recent system performance.
Get Started with ExploitIQ
In this section, you will find quick-access links to the core functions of the application: Request Analysis, View Reports, and Learn More.
Last Week Metrics
In this section, you will find a summary of system performance from the past seven days.
The Request Analysis dialog lets you choose an input type with SBOM or Single Repository, then enter a CVE ID to analyze.
- SBOM: Upload a JSON SBOM file. Supported formats: SPDX 2.3 and CycloneDX 1.6 JSON.
- Single Repository: Provide a source repository URL and a commit ID instead of an SBOM file.
For private repositories, enable Private repository and enter an Authentication secret (SSH private key or Personal Access Token; the form auto-detects the type).
The user name will be automatically added as a metadata parameter.
Once you have filled in the required fields for your chosen mode (SBOM file or repository and commit) and the CVE ID, you will be able to submit the request
After submitting the request, you will be redirected to the Report page. Once the analysis is complete, you will find a detailed report featuring the Agent's results for your request along with additional data insights.
- Direct Links: You will find that the Repository Name links directly to the git repository, while the Commit ID links to the specific commit used in the analysis.
Note: There is a configurable pool of concurrent requests. Any request that is submitted when the pool is full will be queued. If after a certain time a callback response is not received, the report will be expired (failed).
By clicking on the CVE link:
you will navigate to the CVE Details page where you can find details about a specific CVE.
The Reports area is split into two tabs: SBOMs and Single Repositories. Use the tab that matches how the analysis was submitted to browse, sort, filter, and open results for each report type.
Report Organization: Each row represents a report for that tab’s context (SBOM-based products or single-repository analyses), which may reflect one component or many depending on the original request.
You will be able to sort, filter, and organize the reports table to quickly locate specific data.
After clicking a ID link, you will find one of two views depending on the request type:
-
Single Component: You will be taken directly to the detailed report page as described above.
-
Multiple Components: You will be directed to an SBOM overview page that provides a high-level summary of results across all components.
On this page, you will find:
-
Report Details: You will see general information about the report, including overview statuses such as Repository Analysis Distribution and a CVE Status Summary, which provide high-level data on the SBOM and its associated CVEs. When there are excluded components, the Excluded components field links to a dedicated page that lists component name, package URL, and error for each item that was left out of analysis.
-
Component Table: Below the summary data, you will find a table listing all components included in the SBOM:
You will be able to sort, filter, and organize the reports to quickly locate specific data.
- ID link: Finally, By clicking the ID link, you will be taken to the detailed report page for that specific repository, the same page you would access directly for a single-component SBOM.
A blue Download button is available on the repository report page, providing access to download either the VEX (Vulnerability Exploitability eXchange) data or the complete report as JSON files. The VEX option is only available when the component is in a vulnerable status and is automatically disabled otherwise.










