{"id":13540073,"url":"https://github.com/ncsa/ssh-auditor","last_synced_at":"2026-01-16T06:36:50.375Z","repository":{"id":12955366,"uuid":"73233978","full_name":"ncsa/ssh-auditor","owner":"ncsa","description":"The best way to scan for weak ssh passwords on your network","archived":false,"fork":false,"pushed_at":"2023-12-18T21:46:18.000Z","size":169,"stargazers_count":613,"open_issues_count":5,"forks_count":87,"subscribers_count":26,"default_branch":"master","last_synced_at":"2025-10-02T01:57:16.294Z","etag":null,"topics":["auditing","brute-force","discover","security","ssh"],"latest_commit_sha":null,"homepage":"","language":"Go","has_issues":true,"has_wiki":null,"has_pages":null,"mirror_url":null,"source_name":null,"license":"other","status":null,"scm":"git","pull_requests_enabled":true,"icon_url":"https://github.com/ncsa.png","metadata":{"files":{"readme":"README.md","changelog":null,"contributing":null,"funding":null,"license":"LICENSE.txt","code_of_conduct":null,"threat_model":null,"audit":null,"citation":null,"codeowners":null,"security":null,"support":null,"governance":null,"roadmap":null,"authors":null}},"created_at":"2016-11-08T22:47:38.000Z","updated_at":"2025-09-23T00:36:07.000Z","dependencies_parsed_at":"2024-01-06T01:04:37.533Z","dependency_job_id":"99f2086d-832b-4e8f-a1b8-be61b0dd71e3","html_url":"https://github.com/ncsa/ssh-auditor","commit_stats":null,"previous_names":[],"tags_count":17,"template":false,"template_full_name":null,"purl":"pkg:github/ncsa/ssh-auditor","repository_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/ncsa%2Fssh-auditor","tags_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/ncsa%2Fssh-auditor/tags","releases_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/ncsa%2Fssh-auditor/releases","manifests_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/ncsa%2Fssh-auditor/manifests","owner_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners/ncsa","download_url":"https://codeload.github.com/ncsa/ssh-auditor/tar.gz/refs/heads/master","sbom_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/ncsa%2Fssh-auditor/sbom","scorecard":{"id":677551,"data":{"date":"2025-08-11","repo":{"name":"github.com/ncsa/ssh-auditor","commit":"db27fb886fbda3db6dffd52a41666a0a71985123"},"scorecard":{"version":"v5.2.1-40-gf6ed084d","commit":"f6ed084d17c9236477efd66e5b258b9d4cc7b389"},"score":1.6,"checks":[{"name":"Token-Permissions","score":-1,"reason":"No tokens found","details":null,"documentation":{"short":"Determines if the project's workflows follow the principle of least privilege.","url":"https://github.com/ossf/scorecard/blob/f6ed084d17c9236477efd66e5b258b9d4cc7b389/docs/checks.md#token-permissions"}},{"name":"Packaging","score":-1,"reason":"packaging workflow not detected","details":["Warn: no GitHub/GitLab publishing workflow detected."],"documentation":{"short":"Determines if the project is published as a package that others can easily download, install, easily update, and uninstall.","url":"https://github.com/ossf/scorecard/blob/f6ed084d17c9236477efd66e5b258b9d4cc7b389/docs/checks.md#packaging"}},{"name":"Maintained","score":0,"reason":"0 commit(s) and 0 issue activity found in the last 90 days -- score normalized to 0","details":null,"documentation":{"short":"Determines if the project is \"actively maintained\".","url":"https://github.com/ossf/scorecard/blob/f6ed084d17c9236477efd66e5b258b9d4cc7b389/docs/checks.md#maintained"}},{"name":"Dangerous-Workflow","score":-1,"reason":"no workflows found","details":null,"documentation":{"short":"Determines if the project's GitHub Action workflows avoid dangerous patterns.","url":"https://github.com/ossf/scorecard/blob/f6ed084d17c9236477efd66e5b258b9d4cc7b389/docs/checks.md#dangerous-workflow"}},{"name":"Code-Review","score":0,"reason":"Found 2/28 approved changesets -- score normalized to 0","details":null,"documentation":{"short":"Determines if the project requires human code review before pull requests (aka merge requests) are merged.","url":"https://github.com/ossf/scorecard/blob/f6ed084d17c9236477efd66e5b258b9d4cc7b389/docs/checks.md#code-review"}},{"name":"Binary-Artifacts","score":10,"reason":"no binaries found in the repo","details":null,"documentation":{"short":"Determines if the project has generated executable (binary) artifacts in the source repository.","url":"https://github.com/ossf/scorecard/blob/f6ed084d17c9236477efd66e5b258b9d4cc7b389/docs/checks.md#binary-artifacts"}},{"name":"CII-Best-Practices","score":0,"reason":"no effort to earn an OpenSSF best practices badge detected","details":null,"documentation":{"short":"Determines if the project has an OpenSSF (formerly CII) Best Practices Badge.","url":"https://github.com/ossf/scorecard/blob/f6ed084d17c9236477efd66e5b258b9d4cc7b389/docs/checks.md#cii-best-practices"}},{"name":"License","score":9,"reason":"license file detected","details":["Info: project has a license file: LICENSE.txt:0","Warn: project license file does not contain an FSF or OSI license."],"documentation":{"short":"Determines if the project has defined a license.","url":"https://github.com/ossf/scorecard/blob/f6ed084d17c9236477efd66e5b258b9d4cc7b389/docs/checks.md#license"}},{"name":"Fuzzing","score":0,"reason":"project is not fuzzed","details":["Warn: no fuzzer integrations found"],"documentation":{"short":"Determines if the project uses fuzzing.","url":"https://github.com/ossf/scorecard/blob/f6ed084d17c9236477efd66e5b258b9d4cc7b389/docs/checks.md#fuzzing"}},{"name":"Signed-Releases","score":0,"reason":"Project has not signed or included provenance with any releases.","details":["Warn: release artifact v0.18 not signed: https://api.github.com/repos/ncsa/ssh-auditor/releases/45137778","Warn: release artifact v0.16 not signed: https://api.github.com/repos/ncsa/ssh-auditor/releases/23853478","Warn: release artifact v0.15 not signed: https://api.github.com/repos/ncsa/ssh-auditor/releases/13739479","Warn: release artifact v0.14 not signed: https://api.github.com/repos/ncsa/ssh-auditor/releases/12030266","Warn: release artifact v0.13 not signed: https://api.github.com/repos/ncsa/ssh-auditor/releases/12030170","Warn: release artifact v0.18 does not have provenance: https://api.github.com/repos/ncsa/ssh-auditor/releases/45137778","Warn: release artifact v0.16 does not have provenance: https://api.github.com/repos/ncsa/ssh-auditor/releases/23853478","Warn: release artifact v0.15 does not have provenance: https://api.github.com/repos/ncsa/ssh-auditor/releases/13739479","Warn: release artifact v0.14 does not have provenance: https://api.github.com/repos/ncsa/ssh-auditor/releases/12030266","Warn: release artifact v0.13 does not have provenance: https://api.github.com/repos/ncsa/ssh-auditor/releases/12030170"],"documentation":{"short":"Determines if the project cryptographically signs release artifacts.","url":"https://github.com/ossf/scorecard/blob/f6ed084d17c9236477efd66e5b258b9d4cc7b389/docs/checks.md#signed-releases"}},{"name":"Branch-Protection","score":0,"reason":"branch protection not enabled on development/release branches","details":["Warn: branch protection not enabled for branch 'master'"],"documentation":{"short":"Determines if the default and release branches are protected with GitHub's branch protection settings.","url":"https://github.com/ossf/scorecard/blob/f6ed084d17c9236477efd66e5b258b9d4cc7b389/docs/checks.md#branch-protection"}},{"name":"Security-Policy","score":0,"reason":"security policy file not detected","details":["Warn: no security policy file detected","Warn: no security file to analyze","Warn: no security file to analyze","Warn: no security file to analyze"],"documentation":{"short":"Determines if the project has published a security policy.","url":"https://github.com/ossf/scorecard/blob/f6ed084d17c9236477efd66e5b258b9d4cc7b389/docs/checks.md#security-policy"}},{"name":"SAST","score":0,"reason":"SAST tool is not run on all commits -- score normalized to 0","details":["Warn: 0 commits out of 4 are checked with a SAST tool"],"documentation":{"short":"Determines if the project uses static code analysis.","url":"https://github.com/ossf/scorecard/blob/f6ed084d17c9236477efd66e5b258b9d4cc7b389/docs/checks.md#sast"}},{"name":"Pinned-Dependencies","score":0,"reason":"dependency not pinned by hash detected -- score normalized to 0","details":["Warn: containerImage not pinned by hash: Dockerfile:1: pin your Docker image by updating golang:1.13 to golang:1.13@sha256:8ebb6d5a48deef738381b56b1d4cd33d99a5d608e0d03c5fe8dfa3f68d41a1f8","Warn: containerImage not pinned by hash: testing/docker/alpine-sshd-ok/Dockerfile:1: pin your Docker image by updating alpine to alpine@sha256:4bcff63911fcb4448bd4fdacec207030997caf25e9bea4045fa6c8c44de311d1","Warn: containerImage not pinned by hash: testing/docker/alpine-sshd-test-blank/Dockerfile:1: pin your Docker image by updating alpine to alpine@sha256:4bcff63911fcb4448bd4fdacec207030997caf25e9bea4045fa6c8c44de311d1","Warn: containerImage not pinned by hash: testing/docker/alpine-sshd-test-key/Dockerfile:1: pin your Docker image by updating alpine to alpine@sha256:4bcff63911fcb4448bd4fdacec207030997caf25e9bea4045fa6c8c44de311d1","Warn: containerImage not pinned by hash: testing/docker/alpine-sshd-test-test-no-id-binary-no-tunnel/Dockerfile:1: pin your Docker image by updating alpine to alpine@sha256:4bcff63911fcb4448bd4fdacec207030997caf25e9bea4045fa6c8c44de311d1","Warn: containerImage not pinned by hash: testing/docker/alpine-sshd-test-test-no-id-binary-tunnel-local/Dockerfile:1: pin your Docker image by updating alpine to alpine@sha256:4bcff63911fcb4448bd4fdacec207030997caf25e9bea4045fa6c8c44de311d1","Warn: containerImage not pinned by hash: testing/docker/alpine-sshd-test-test-no-id-binary/Dockerfile:1: pin your Docker image by updating alpine to alpine@sha256:4bcff63911fcb4448bd4fdacec207030997caf25e9bea4045fa6c8c44de311d1","Warn: containerImage not pinned by hash: testing/docker/alpine-sshd-test-test/Dockerfile:1: pin your Docker image by updating alpine to alpine@sha256:4bcff63911fcb4448bd4fdacec207030997caf25e9bea4045fa6c8c44de311d1","Info:   0 out of   8 containerImage dependencies pinned"],"documentation":{"short":"Determines if the project has declared and pinned the dependencies of its build process.","url":"https://github.com/ossf/scorecard/blob/f6ed084d17c9236477efd66e5b258b9d4cc7b389/docs/checks.md#pinned-dependencies"}},{"name":"Vulnerabilities","score":2,"reason":"8 existing vulnerabilities detected","details":["Warn: Project is vulnerable to: GO-2020-0012 / GHSA-ffhg-7mh4-33c4","Warn: Project is vulnerable to: GO-2021-0227 / GHSA-3vm4-22fp-5rfm","Warn: Project is vulnerable to: GO-2022-0968 / GHSA-gwc9-m7rh-j2ww","Warn: Project is vulnerable to: GO-2021-0356 / GHSA-8c26-wmh5-6g9v","Warn: Project is vulnerable to: GO-2024-2961","Warn: Project is vulnerable to: GO-2023-2402 / GHSA-45x7-px36-x8w8","Warn: Project is vulnerable to: GO-2024-3321 / GHSA-v778-237x-gjrc","Warn: Project is vulnerable to: GO-2025-3487 / GHSA-hcg3-q754-cr77"],"documentation":{"short":"Determines if the project has open, known unfixed vulnerabilities.","url":"https://github.com/ossf/scorecard/blob/f6ed084d17c9236477efd66e5b258b9d4cc7b389/docs/checks.md#vulnerabilities"}}]},"last_synced_at":"2025-08-21T21:59:23.475Z","repository_id":12955366,"created_at":"2025-08-21T21:59:23.475Z","updated_at":"2025-08-21T21:59:23.475Z"},"host":{"name":"GitHub","url":"https://github.com","kind":"github","repositories_count":286080680,"owners_count":28477884,"icon_url":"https://github.com/github.png","version":null,"created_at":"2022-05-30T11:31:42.601Z","updated_at":"2026-01-16T06:30:42.265Z","status":"ssl_error","status_checked_at":"2026-01-16T06:30:16.248Z","response_time":107,"last_error":"SSL_read: unexpected eof while reading","robots_txt_status":"success","robots_txt_updated_at":"2025-07-24T06:49:26.215Z","robots_txt_url":"https://github.com/robots.txt","online":false,"can_crawl_api":true,"host_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub","repositories_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories","repository_names_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repository_names","owners_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners"}},"keywords":["auditing","brute-force","discover","security","ssh"],"created_at":"2024-08-01T09:01:39.324Z","updated_at":"2026-01-16T06:36:50.343Z","avatar_url":"https://github.com/ncsa.png","language":"Go","readme":"[![Build Status](https://travis-ci.org/ncsa/ssh-auditor.svg?branch=master)](https://travis-ci.org/ncsa/ssh-auditor)\n\n# SSH Auditor\n\n\n## Features\n\nssh-auditor will automatically:\n\n* Re-check all known hosts as new credentials are added.  It will only check the new credentials.\n* Queue a full credential scan on any new host discovered.\n* Queue a full credential scan on any known host whose ssh version or key fingerprint changes.\n* Attempt command execution as well as attempt to tunnel a TCP connection.\n* Re-check each credential using a per credential `scan_interval` - default 14 days.\n\n\nIt's designed so that you can run `ssh-auditor discover` + `ssh-auditor scan`\nfrom cron every hour to to perform a constant audit.\n\n## Demos\n\n# Earlier demo showing all of the features\n[![demo](https://asciinema.org/a/5rb3wv8oyoqzd80jfl03grrcv.png)](https://asciinema.org/a/5rb3wv8oyoqzd80jfl03grrcv?autoplay=1)\n\n# Demo showing improved log output\n\n[![demo](https://asciinema.org/a/F3fQYyJcieCS9Kfna6xWferjK.png)](https://asciinema.org/a/F3fQYyJcieCS9Kfna6xWferjK?autoplay=1)\n\n\n## Usage\n\n### Install\n\n    $ brew install go # or however you want to install the go compiler\n    $ go get github.com/ncsa/ssh-auditor\n\n### or Build from a git clone\n\n    $ go build\n\n### Build a static binary including sqlite\n\n    $ make static\n\n### Ensure you can use enough file descriptors\n\n    $ ulimit -n 4096\n\n### Create initial database and discover ssh servers\n\n    $ ./ssh-auditor discover -p 22 -p 2222 192.168.1.0/24 10.0.0.1/24\n\n### Add credential pairs to check\n\n    $ ./ssh-auditor addcredential root root\n    $ ./ssh-auditor addcredential admin admin\n    $ ./ssh-auditor addcredential guest guest --scan-interval 1 #check this once per day\n\n### Try credentials against discovered hosts\n\n    $ ./ssh-auditor scan\n\n### Output a report on what credentials worked\n\n    $ ./ssh-auditor vuln\n\n### RE-Check credentials that worked\n\n    $ ./ssh-auditor rescan\n\n### Output a report on duplicate key usage\n\n    $ ./ssh-auditor dupes\n\n## TODO\n\n - [x] update the 'host changes' table\n - [x] handle false positives from devices that don't use ssh password authentication but instead use the shell to do it.\n - [x] variable re-check times - each credential has a scan_interval in days\n - [x] better support non-standard ports - discover is the only thing that needs to be updated, the rest doesn't care.\n - [ ] possibly daemonize and add an api that bro could hook into to kick off a discover as soon as a new SSH server is detected.\n - [ ] make the store pluggable (mysql, postgresql).\n - [x] differentiate between a failed password attempt and a failed connection or timeout.  Mostly done.  Things like fail2ban complicate this.\n - [x] add go implementations for the report sqlite3 command.\n\n## Report query.\n\nThis query that `ssh-auditor vuln` runs is\n\n    select\n            hc.hostport, hc.user, hc.password, hc.result, hc.last_tested, h.version\n     from\n            host_creds hc, hosts h\n     where\n            h.hostport = hc.hostport\n     and    result!='' order by last_tested asc\n","funding_links":[],"categories":["\u003ca id=\"c49aef477cf3397f97f8b72185c3d100\"\u003e\u003c/a\u003e密码\u0026\u0026凭证","Go","Security","\u003ca id=\"862af330f45f21fbb0d495837fc7e879\"\u003e\u003c/a\u003e工具","System","Hardening"],"sub_categories":["\u003ca id=\"20bf2e2fefd6de7aadbf0774f4921824\"\u003e\u003c/a\u003e未分类-Password","Sensor and Acuator Interfaces","Hardening","Security","Ghidra"],"project_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2Fncsa%2Fssh-auditor","html_url":"https://awesome.ecosyste.ms/projects/github.com%2Fncsa%2Fssh-auditor","lists_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2Fncsa%2Fssh-auditor/lists"}