Vulnerability scan outputs

Identifies vulnerability scan outputs patterns in security and access control contexts. Detects potential exposure of sensitive security information in Australian systems.

Type
regex
Engine
boost_regex
Confidence
medium
Confidence justification
structural regex with domain-specific anchors and constrained context replaces phrase-only marker.
Detection quality
Mixed
Jurisdictions
au
Regulations
Criminal Code Act 1995 (Cth), SOCI Act 2018 (Cth)
Frameworks
CIS Controls, ISO 27001
Data categories
credentials, security
Scope
wide
Platform compatibility
Purview: Compatible, GCP DLP: Compatible, Macie: Compatible, Zscaler: Compatible, Palo Alto: Degraded, Netskope: Unsupported

Pattern

(?is)\b(?:vulnerability\s+scan\s+outputs|vulnerability\s+scan|cvss\s+score|severity\s+rating|security\s+assessment|penetration\s+test)\b

Corroborative evidence keywords

vulnerability scan outputs, vulnerability, scan, outputs, security, operations, threat, data

Proximity: 300 characters

Should match

Should not match

Known false positives

References