1414
1515flow : |
1616 ssl();
17-
17+
1818 // Process SSL certificate data using built-in variables
1919 const certSubject = template["ssl_subject_dn"];
2020 const certIssuer = template["ssl_issuer_dn"];
@@ -23,10 +23,10 @@ flow: |
2323 const tlsVersion = template["ssl_tls_version"];
2424 const cipherSuite = template["ssl_cipher"];
2525 const domains = template["ssl_domains"];
26-
26+
2727 let securityScore = 100;
2828 let findings = [];
29-
29+
3030 // Build certificate analysis
3131 const certAnalysis = {
3232 "subject": certSubject || "N/A",
@@ -37,9 +37,9 @@ flow: |
3737 "cipher_suite": cipherSuite || "N/A",
3838 "domains": domains || "N/A"
3939 };
40-
40+
4141 set("cert_analysis", JSON.stringify(certAnalysis, null, 2));
42-
42+
4343 // Check certificate expiration
4444 if (certNotAfter) {
4545 try {
@@ -62,7 +62,7 @@ flow: |
6262 findings.push("Could not parse expiration date");
6363 }
6464 }
65-
65+
6666 // Check TLS version
6767 if (tlsVersion) {
6868 const version = tlsVersion.toLowerCase();
@@ -74,7 +74,7 @@ flow: |
7474 set("weak_tls_version", false);
7575 }
7676 }
77-
77+
7878 // Calculate final security assessment
7979 const finalScore = Math.max(securityScore, 0);
8080 const riskLevel = finalScore > 80 ? "Low" :
@@ -84,7 +84,7 @@ flow: |
8484 set("ssl_security_score", finalScore);
8585 set("ssl_risk_level", riskLevel);
8686 set("security_findings", findings.join("; "));
87-
87+
8888 http();
8989
9090ssl :
@@ -108,4 +108,4 @@ http:
108108 dsl :
109109 - ' "SSL Security Score: " + ssl_security_score + "/100 (" + ssl_risk_level + " Risk)"'
110110 - ' "Certificate: " + cert_analysis'
111- - ' "Findings: " + security_findings'
111+ - ' "Findings: " + security_findings'
0 commit comments