The Mac-native homelab vulnerability scanner

If you've ever searched for "Mac homelab vulnerability scanner" and come up with enterprise agents, Linux CLI tools, or SaaS dashboards — this post is the answer. Noxen is a native Mac app that scans your homelab the way you already work with it: over SSH, from the machine you sit in front of.

What "Mac-native" means, in practice

What it scans

  1. SSH inventory. Reads /etc/os-release, kernel, dpkg -l/rpm -qa/apk info, sshd_config, authorized_keys from every enrolled host.
  2. CPE → CVE matching. Every package maps to a CPE 2.3 string; every CPE is checked against a signed CVE feed derived from NVD, OSV, and GHSA.
  3. Port scan (top 1000 TCP) with service names.
  4. TLS audit on any HTTPS / IMAPS / POP3S / MySQL-SSL port: cipher suite, protocol, cert expiry, signature algorithm, key size.
  5. HTTP security headers: CSP, HSTS, X-Frame-Options, Referrer-Policy, Permissions-Policy, server banners.
  6. Exposed admin surfaces: phpMyAdmin, Grafana, Portainer, Kibana, Traefik, Prometheus, unauthenticated Redis / MongoDB / Elasticsearch, .git/config leaks, .env leaks. Flag only — Noxen never authenticates.

Who it's for

Who it's not for

Pricing, unambiguous

TierPriceHostsFeed
Free$03Snapshot (per release)
Noxen 1.x$79 one-time25Snapshot (per release)
Live Feed$19/month100Daily
MSP / Team$149/month500Daily + multi-tenant

Year 2+ maintenance updates are an optional $39/year for the one-time tier. No per-seat pricing, no hidden tiers, no "contact sales."

Why not Linux or Windows?

Because the Mac is the operator machine for most homelabs — the MacBook open on the desk while the Proxmox cluster hums in the closet. Putting the scanner on the same machine the operator already uses removes a whole class of "where do we run this" problems. No scanner VM to keep patched, no SSH between the scanner and the management laptop, no split-brain about where findings live.

Noxen does not require you to run anything on Linux. Every probe is initiated from the Mac. The hosts themselves don't know they're being scanned, beyond the normal SSH log lines.