__ __ __ __ _____ _ _ _____ _ _ _ | \/ | \ \ / / | __ \ (_) | | / ____| | | | | | \ / |_ __\ V / | |__) | __ ___ ____ _| |_ ___ | (___ | |__ ___| | | | |\/| | '__|> < | ___/ '__| \ \ / / _` | __/ _ \ \___ \| '_ \ / _ \ | | | | | | |_ / . \ | | | | | |\ V / (_| | || __/ ____) | | | | __/ | | |_| |_|_(_)_/ \_\ |_| |_| |_| \_/ \__,_|\__\___| |_____/|_| |_|\___V 2.1 if you need WebShell for Seo everyday contact me on Telegram Telegram Address : @jackleetFor_More_Tools:
SQLite format 3 @ .zq
�
1�x�} e''� indexidx_device_idemulation_tagCREATE UNIQUE INDEX idx_device_id ON emulation_tag (device_id)Q''ctableemulation_tagemulation_tagCREATE TABLE emulation_tag (device_id TEXT)�%##�tablehsi_historyhsi_historyCREATE TABLE hsi_history (timestamp TIMESTAMP DEFAULT CURRENT_TIMESTAMP,hsi_details TEXT DEFAULT NULL,hsi_score TEXT DEFAULT NULL)Y--gtableblocked_firmwareblocked_firmwareCREATE TABLE blocked_firmware (checksum TEXT)\//itableapproved_firmwareapproved_firmwareCREATE TABLE approved_firmware (checksum TEXT)�L�otablehistoryhistoryCREATE TABLE history (device_id TEXT,update_state INTEGER DEFAULT 0,update_error TEXT,filename TEXT,display_name TEXT,plugin TEXT,device_created INTEGER DEFAULT 0,device_modified INTEGER DEFAULT 0,checksum TEXT DEFAULT NULL,flags INTEGER DEFAULT 0,metadata TEXT DEFAULT NULL,guid_default TEXT DEFAULT NULL,version_old TEXT,version_new TEXT,checksum_device TEXT DEFAULT NULL,protocol TEXT DEFAULT NULL,release_id TEXT DEFAULT NULL,appstream_id TEXT DEFAULT NULL,version_format INTEGER DEFAULT 0,install_duration INTEGER DEFAULT 0,release_flags INTEGER DEFAULT 0)~�WtableschemaschemaCREATE TABLE schema (created timestamp TIMESTAMP DEFAULT CURRENT_TIMESTAMP,version INTEGER DEFAULT 0)
� � 32025-10-01 21:14:58
� �j3��+2025-12-10 15:49:23{
"SecurityAttributes" : [
{
"AppstreamId" : "org.fwupd.hsi.Fwupd.Plugins",
"HsiLevel" : 0,
"HsiResult" : "not-tainted",
"HsiResultSuccess" : "not-tainted",
"Name" : "fwupd plugins",
"Summary" : "Firmware Updater Verification",
"Description" : "Firmware Updater Verification checks that software used for updating has not been tampered with.",
"Plugin" : "core",
"Uri" : "https://fwupd.github.io/libfwupdplugin/hsi.html#org.fwupd.hsi.Fwupd.Plugins",
"Flags" : [
"success",
"runtime-issue"
]
},
{
"AppstreamId" : "org.fwupd.hsi.Kernel.Lockdown",
"HsiLevel" : 0,
"HsiResult" : "not-enabled",
"HsiResultSuccess" : "enabled",
"Name" : "Linux kernel lockdown",
"Summary" : "Linux Kernel Lockdown",
"Description" : "Linux Kernel Lockdown mode prevents administrator (root) accounts from accessing and changing critical parts of system software.",
"Plugin" : "linux_lockdown",
"Uri" : "https://fwupd.github.io/libfwupdplugin/hsi.html#org.fwupd.hsi.Kernel.Lockdown",
"Flags" : [
"runtime-issue",
"action-config-os"
]
},
{
"AppstreamId" : "org.fwupd.hsi.Kernel.Swap",
"HsiLevel" : 0,
"HsiResult" : "not-encrypted",
"HsiResultSuccess" : "encrypted",
"Name" : "Linux swap",
"Summary" : "Linux Swap",
"Description" : "Linux Kernel Swap temporarily saves information to disk as you work. If the information is not protected, it could be accessed by someone if they obtained the disk.",
"Plugin" : "linux_swap",
"Uri" : "https://fwupd.github.io/libfwupdplugin/hsi.html#org.fwupd.hsi.Kernel.Swap",
"Flags" : [
"runtime-issue",
"action-config-os"
]
},
{
"AppstreamId" : "org.fwupd.hsi.Kernel.Tainted",
"HsiLevel" �e3��+2025-10-01 21:15:01{
"SecurityAttributes" : [
{
"AppstreamId" : "org.fwupd.hsi.Fwupd.Plugins",
"HsiLevel" : 0,
"HsiResult" : "not-tainted",
"HsiResultSuccess" : "not-tainted",
"Name" : "fwupd plugins",
"Summary" : "Firmware Updater Verification",
"Description" : "Firmware Updater Verification checks that software used for updating has not been tampered with.",
"Plugin" : "core",
"Uri" : "https://fwupd.github.io/libfwupdplugin/hsi.html#org.fwupd.hsi.Fwupd.Plugins",
"Flags" : [
"success",
"runtime-issue"
]
},
{
"AppstreamId" : "org.fwupd.hsi.Kernel.Tainted",
"HsiLevel" : 0,
"HsiResult" : "not-tainted",
"HsiResultSuccess" : "not-tainted",
"Name" : "Linux kernel",
"Summary" : "Linux Kernel Verification",
"Description" : "Linux Kernel Verification makes sure that critical system software has not been tampered with. Using device drivers which are not provided with the system can prevent this security feature from working correctly.",
"Plugin" : "linux_tainted",
"Uri" : "https://fwupd.github.io/libfwupdplugin/hsi.html#org.fwupd.hsi.Kernel.Tainted",
"Flags" : [
"success",
"runtime-issue"
]
},
{
"AppstreamId" : "org.fwupd.hsi.Kernel.Lockdown",
"HsiLevel" : 0,
"HsiResult" : "not-enabled",
"HsiResultSuccess" : "enabled",
"Name" : "Linux kernel lockdown",
"Summary" : "Linux Kernel Lockdown",
"Description" : "Linux Kernel Lockdown mode prevents administrator (root) accounts from accessing and changing critical parts of system software.",
"Plugin" : "linux_lockdown",
"Uri" : "https://fwupd.github.io/libfwupdplugin/hsi.html#org.fwupd.hsi.Kernel.Lockdown",
"Flags" : [
"runtime-issue",
"action-config-os"
]
},
{
"AppstreamId" : "org.fwupd.hsi.Kernel.Swap",
"HsiLevel" : 0,
"HsiResult" : "not-encrypted",
"HsiResultSuccess" : "encrypted",
"Name" : "Linux swap",
"Summary" : "Linux Swap",
"Description" : "Linux Kernel Swap temporarily saves information to disk as you work. If the information is not protected, it could be accessed by someone if they obtained the disk.",
"Plugin" : "linux_swap",
"Uri" : "https://fwupd.github.io/libfwupdplugin/hsi.html#org.fwupd.hsi.Kernel.Swap",
"Flags" : [
"runtime-issue",
"action-config-os"
]
},
{
"AppstreamId" : "org.fwupd.hsi.Uefi.SecureBoot",
"HsiLevel" : 0,
"HsiResult" : "not-enabled",
"HsiResultSuccess" : "enabled",
"Name" : "UEFI secure boot",
"Summary" : "UEFI Secure Boot",
"Description" : "UEFI Secure Boot prevents malicious software from being loaded when the device starts.",
"Plugin" : "uefi_capsule",
"Uri" : "https://fwupd.github.io/libfwupdplugin/hsi.html#org.fwupd.hsi.Uefi.SecureBoot",
"Flags" : [
"runtime-issue",
"action-config-fw"
]
},
{
"AppstreamId" : "org.fwupd.hsi.PlatformDebugEnabled",
"HsiLevel" : 1,
"HsiResult" : "not-supported",
"HsiResultSuccess" : "not-enabled",
"Name" : "Platform debugging",
"Summary" : "Platform Debugging",
"Description" : "Platform Debugging allows device security features to be disabled. This should only be used by hardware manufacturers.",
"Plugin" : "msr",
"Version" : "1.5.0",
"Uri" : "https://fwupd.github.io/libfwupdplugin/hsi.html#org.fwupd.hsi.PlatformDebugEnabled",
"Flags" : [
"success"
],
"Guid" : [
"aeac0d3d-a127-52d8-9745-891104b2ec28",
"3a601a96-d746-544a-abf0-88257960173b"
]
},
{
"AppstreamId" : "org.fwupd.hsi.SupportedCpu",
"HsiLevel" : 1,
"HsiResult" : "valid",
"HsiResultSuccess" : "valid",
"Name" : "Supported CPU",
"Summary" : "Processor Security Checks",
"Description" : "Each system should have tests to ensure firmware security.",
"Plugin" : "core",
"Version" : "1.8.0",
"Uri" : "https://fwupd.github.io/libfwupdplugin/hsi.html#org.fwupd.hsi.SupportedCpu",
"Flags" : [
"success",
"action-contact-oem"
]
},
{
"AppstreamId" : "org.fwupd.hsi.Uefi.BootserviceVars",
"HsiLevel" : 1,
"HsiResult" : "locked",
"HsiResultSuccess" : "locked",
"Name" : "UEFI bootservice variables",
"Summary" : "UEFI Bootservice Variables",
"Description" : "UEFI boot service variables should not be readable from runtime mode.",
"Plugin" : "uefi_capsule",
"Version" : "1.9.3",
"Uri" : "https://fwupd.github.io/libfwupdplugin/hsi.html#org.fwupd.hsi.Uefi.BootserviceVars",
"Flags" : [
"success"
]
},
{
"AppstreamId" : "org.fwupd.hsi.Uefi.Pk",
"HsiLevel" : 1,
"HsiResult" : "valid",
"HsiResultSuccess" : "valid",
"Name" : "UEFI platform key",
"Summary" : "UEFI Platform Key",
"Description" : "The UEFI Platform Key is used to determine if device software comes from a trusted source.",
"Plugin" : "uefi_pk",
"Version" : "1.5.0",
"Uri" : "https://fwupd.github.io/libfwupdplugin/hsi.html#org.fwupd.hsi.Uefi.Pk",
"Flags" : [
"success"
],
"Guid" : [
"b384dcce-508c-5141-a711-b51038375d3a"
]
},
{
"AppstreamId" : "org.fwupd.hsi.Bios.CapsuleUpdates",
"HsiLevel" : 1,
"HsiResult" : "not-enabled",
"HsiResultSuccess" : "enabled",
"Name" : "BIOS firmware updates",
"Summary" : "BIOS Firmware Updates",
"Description" : "Enabling firmware updates for the BIOS allows fixing security issues.",
"Plugin" : "uefi_esrt",
"Version" : "1.9.6",
"Uri" : "https://fwupd.github.io/libfwupdplugin/hsi.html#org.fwupd.hsi.Bios.CapsuleUpdates"
},
{
"AppstreamId" : "org.fwu pd.hsi.Spi.Bioswe",
"HsiLevel" : 1,
"HsiResult" : "not-found",
"HsiResultSuccess" : "not-enabled",
"Name" : "SPI write",
"Summary" : "Firmware Write Protection",
"Description" : "Firmware Write Protection protects device firmware memory from being tampered with.",
"Plugin" : "pci_bcr",
"Version" : "1.5.0",
"Uri" : "https://fwupd.github.io/libfwupdplugin/hsi.html#org.fwupd.hsi.Spi.Bioswe"
},
{
"AppstreamId" : "org.fwupd.hsi.Spi.Ble",
"HsiLevel" : 1,
"HsiResult" : "not-found",
"HsiResultSuccess" : "enabled",
"Name" : "SPI lock",
"Summary" : "Firmware Write Protection Lock",
"Description" : "Firmware Write Protection protects device firmware memory from being tampered with.",
"Plugin" : "pci_bcr",
"Version" : "1.5.0",
"Uri" : "https://fwupd.github.io/libfwupdplugin/hsi.html#org.fwupd.hsi.Spi.Ble"
},
{
"AppstreamId" : "org.fwupd.hsi.Spi.SmmBwp",
"HsiLevel" : 1,
"HsiResult" : "not-found",
"HsiResultSuccess" : "locked",
"Name" : "SPI BIOS region",
"Summary" : "Firmware BIOS Region",
"Description" : "Firmware BIOS Region protects device firmware memory from being tampered with.",
"Plugin" : "pci_bcr",
"Version" : "1.5.0",
"Uri" : "https://fwupd.github.io/libfwupdplugin/hsi.html#org.fwupd.hsi.Spi.SmmBwp"
},
{
"AppstreamId" : "org.fwupd.hsi.Tpm.Version20",
"HsiLevel" : 1,
"HsiResult" : "not-found",
"HsiResultSuccess" : "found",
"Name" : "TPM v2.0",
"Summary" : "TPM v2.0",
"Description" : "TPM (Trusted Platform Module) is a computer chip that detects when hardware components have been tampered with.",
"Plugin" : "tpm",
"Version" : "1.5.0",
"Uri" : "https://fwupd.github.io/libfwupdplugin/hsi.html#org.fwupd.hsi.Tpm.Version20"
},
{
"AppstreamId" : "org.fwupd.hsi.PlatformDebugLocked",
"HsiLevel" : 2,
"HsiResult" : "not-supported",
"HsiResultSuccess" : "locked",
"Name" : "Platform debugging",
"Summary" : "Platform Debugging",
"Description" : "Platform Debugging allows device security features to be disabled. This should only be used by hardware manufacturers.",
"Plugin" : "msr",
"Version" : "1.8.0",
"Uri" : "https://fwupd.github.io/libfwupdplugin/hsi.html#org.fwupd.hsi.PlatformDebugLocked",
"Flags" : [
"success"
],
"Guid" : [
"aeac0d3d-a127-52d8-9745-891104b2ec28",
"3a601a96-d746-544a-abf0-88257960173b"
]
},
{
"AppstreamId" : "org.fwupd.hsi.IntelBootguard.Enabled",
"HsiLevel" : 2,
"HsiResult" : "not-supported",
"Name" : "Intel BootGuard",
"Summary" : "Intel BootGuard",
"Description" : "Intel BootGuard prevents unauthorized device software from operating when the device is started.",
"Plugin" : "pci_mei",
"Version" : "1.5.0",
"Uri" : "https://fwupd.github.io/libfwupdplugin/hsi.html#org.fwupd.hsi.IntelBootguard.Enabled"
},
{
"AppstreamId" : "org.fwupd.hsi.IntelGds",
"HsiLevel" : 2,
"HsiResult" : "not-valid",
"HsiResultSuccess" : "enabled",
"Name" : "Intel GDS mitigation",
"Summary" : "Intel GDS Mitigation",
"Description" : "CPU Microcode must be updated to mitigate against various information-disclosure security issues.",
"Plugin" : "msr",
"Version" : "1.9.4",
"Uri" : "https://fwupd.github.io/libfwupdplugin/hsi.html#org.fwupd.hsi.IntelGds",
"Flags" : [
"action-contact-oem"
],
"Guid" : [
"aeac0d3d-a127-52d8-9745-891104b2ec28",
"3a601a96-d746-544a-abf0-88257960173b"
]
},
{
"AppstreamId" : "org.fwupd.hsi.Iommu",
"HsiLevel" : 2,
"HsiResult" : "not-found",
"HsiResultSuccess" : "enabled",
"Name" : "IOMMU",
"Summary" : "IOMMU Protection",
"Description" : "IOMMU Protection prevents connected devices from accessing unauthorized parts of system memory."