Known Limitations

Know what the portal cannot guarantee before you act.

This page collects the practical limits of public-source coverage, local browser state, generated tool output, and live-derived vulnerability views.

Coverage

Partialpublic feeds are useful but not exhaustive

Freshness

Variableruntime and upstream state can lag or degrade

Local risk

Unknownasset exposure and compromise need environment evidence

Outputs

Draftgenerated rules, queries, and summaries require review

Common places where users can overread the site

Coverage is not universal

The portal may not include every CVE, vendor advisory, exploit note, package update, private disclosure, or regional source.

Freshness can change

A page can render successfully while an upstream feed is stale, cached, degraded, unavailable, filtered empty, or missing structured fields.

Source confidence is not truth

Confidence labels help pace validation. They do not prove local exposure, compromise, remediation, business impact, or vendor intent.

Threat views are derived

Maps, actors, ransomware relevance, exploit-chain views, and campaign cards are orientation layers, not live packet telemetry or incident evidence.

Tools produce starting points

IOC extraction, Sigma, YARA, hunt, regex, CVSS, and exposure outputs need field checks, false-positive review, owner validation, and scope control.

Local browser state is not a system of record

Saved items, notes, compare queues, and exports are helpful working aids. Formal approvals and closure evidence belong in official systems.