Why this is a power feature
Web scanning is not required for initial SIEM bring-up, but it’s a high-leverage add-on for reducing attack surface. Use it for:- periodic external exposure reviews (what are we accidentally exposing?)
- validating suspected vulnerabilities during an incident
- confirming whether a customer-facing app has known weak configurations (TLS, headers, exposed endpoints)
How it works in CoPilot (high level)
- You enable the CoPilot Nuclei module
- You submit a target host/domain (and any supported scan options)
- CoPilot runs Nuclei in the background
- Results are stored and displayed as a report
- You can drill into each finding for evidence and reproduction detail
Setup checklist
1) Enable the Nuclei module (Docker)
In the video walkthrough, Nuclei is enabled by adding the CoPilot Nuclei module container to your CoPilotdocker-compose.yml, then running a compose up.
Success check:
- the Nuclei module container is running
- the Web vulnerability assessment entry becomes available in the UI
2) Confirm scanner reachability
The scanner runtime must be able to reach your targets. Confirm:- DNS resolution works from the scanner runtime
- egress is allowed to the target(s)
- you’re scoping to assets you own/have permission to scan
Running a scan
Typical workflow (from the video):- Open Web vulnerability assessment
- Select Create new report (if applicable)
- Enter a target host/domain
- you usually don’t need to include
http://orhttps://if the UI accepts a host
- you usually don’t need to include
- Submit
- Wait for completion, then refresh the page
Understanding results
Once results are available, you can typically:- see a list of findings (grouped by type)
- open a finding to review details
- description of what was detected
- affected URL
- the HTTP request/response evidence
- the curl command Nuclei used (useful for reproduction and follow-up testing)
- validate the finding
- hand evidence to an app owner
- reproduce safely in a test environment
Practical operator usage
A good operator loop:- Run a scan against a specific application
- Identify quick wins (weak TLS/ciphers, exposed Swagger/OpenAPI, debug endpoints)
- Create remediation tasks and validate closure by rescanning
Safety / guardrails
- Only scan assets you own or have explicit permission to test.
- Scanning can trigger WAF blocks, rate limits, or availability impact.
- start with a single target
- schedule scans during a quiet window
- avoid aggressive configurations by default
Troubleshooting
-
No results / scan never completes:
- confirm the Nuclei module container is running
- confirm the scanner can reach the target host
- check CoPilot/Nuclei module logs
-
False positives:
- use the request/response + curl output to validate
- tune templates/scan scope as needed
