Articles on: Vulnerabilities

Vulnerability Assets

Vulnerability Assets

The Assets page gives you an overview of your organization’s hosts and their security posture. Unlike the Issues page, which lists individual vulnerabilities, the Assets page focuses on what is at risk—hosts and SSL certificates—so you can prioritize remediation efforts per asset.


Vulnerability Assets

High‑level metrics

At the top of the page you’ll find four cards summarizing key asset statistics.

  • Total Hosts – shows how many hosts are being monitored, with the number of active hosts beneath.
  • Vulnerable Hosts – indicates the number of hosts with at least one open vulnerability and what percentage of total hosts this represents.
  • SSL Certificates – counts the SSL certificates discovered and notes how many are expired.
  • Expiring Soon – counts certificates expiring within the next 30 days.


A Request Intelligence button lets you ask the Selki team to provide additional security insights for your assets. (Currently disabled)


Tabs: Network Hosts and SSL Certificates

The page is divided into two tabs.

Network Hosts

This tab lists hosts and their associated services and vulnerabilities. Key features include:

  • Search bar and action icons – You can search by host, service or issue. Adjacent icons allow you to filter results, refresh the list or share.
  • Host cards – Each row represents a host. It shows:
  • Host name and group label (e.g., envato.com).
  • Counts of hostnames, services and issues associated with the host.
  • A list of vulnerability tags summarizing the issues affecting that host; tags are color‑coded by severity.
  • The last observed date for the host.
  • Side panel details – Clicking a host opens a side panel with detailed informationdashboard.selki.io:
  • Last seen, number of hostnames, services and vulnerabilities.
  • Hostnames – lists all resolved DNS names.
  • Running services – shows the service name, port and whether it is open.
  • Highest risk vulnerabilities – lists up to three open vulnerabilities with severity labels and risk scores; a View All Vulnerabilities button takes you directly to the vulnerability details page.
  • The panel allows quick triage without leaving the assets page.

SSL Certificates

The SSL Certificates tab summarises certificate inventory and highlights certificates that are expiring or expired. Features include:

  • Certificate list – Each entry displays:
  • The domain or wildcard certificate (e.g., envato.com or *.envato.com).
  • A status tag such as Expiring or Valid.
  • Issuer, fingerprint algorithm and public key algorithm with key size.
  • A list of subject alternative names (SANs) included in the certificate.
  • An indicator of whether the certificate has expired or the number of days remaining until expiry.
  • Certificate detail panel – Double‑clicking a certificate opens a side panel with in‑depth informationdashboard.selki.io:
  • Validity period (Valid From / Valid Until) and how many days remain (e.g., “–8 Days Left”).
  • Signature algorithm and key size.
  • Detailed fields such as serial number, fingerprint (SHA256), signature algorithm, public key algorithm and subject alternative names.
  • Raw certificate data in JSON format for auditors or advanced analysis.


Using the Assets page effectively

  1. Monitor high‑level risk – Use the top metrics to see at a glance how many hosts are vulnerable and whether any SSL certificates need urgent renewal.
  2. Prioritise hosts – In the Network Hosts tab, sort or search to find hosts with the most issues. Open the side panel to see which vulnerabilities are highest risk.
  3. Investigate services – Check the list of running services for each host. Exposed services and open ports could increase attack surface.
  4. Plan certificate renewal – Switch to the SSL Certificates tab to identify certificates that have expired or will soon expire. Use the detail panel to obtain validity dates and cryptographic details.
  5. Request additional insights – If you need deeper analysis for a critical host or certificate, use the Request Intelligence button at the top.


The Assets page consolidates asset inventory, vulnerability status, and certificate management into one interface, helping security teams prioritise remediation and maintain a secure infrastructure.


Updated on: 15/09/2025

Was this article helpful?

Share your feedback

Cancel

Thank you!