Assets
Manage the resources Seenty monitors and protects -- domains, cloud accounts, repositories, and endpoint collections.
Assets
Assets are the resources you register with Seenty for monitoring and security scanning. Each asset type provides different kinds of visibility into your attack surface.
Asset types
Domains
Register your domains, verify ownership, and let Seenty discover subdomains, detect technologies, and scan for vulnerabilities on a nightly schedule.
Cloud Accounts
Connect your AWS or Azure accounts with read-only credentials to scan IAM policies, storage configurations, and network security groups.
Repositories
Scan your code repositories for leaked secrets, vulnerable dependencies, and infrastructure-as-code misconfigurations.
Endpoint Collections
Group API endpoints together and scan them directly without requiring DNS domain verification.
How assets relate to findings
When Seenty scans an asset, it produces findings -- security issues grouped under Security Posture in the sidebar. Each finding is linked back to the asset where it was discovered, so you can always trace a problem to its source.
| Asset Type | Finding Categories |
|---|---|
| Domains | Misconfigurations (DNS, headers), Vulnerabilities (CVEs in detected tech) |
| Cloud Accounts | Misconfigurations (IAM, storage, network) |
| Repositories | Secrets (leaked credentials), Vulnerabilities (dependency CVEs), Misconfigurations (IaC, Dockerfile) |
| Endpoint Collections | Misconfigurations (headers, TLS) |
Plan requirements
| Feature | Hobby | Starter | Pro | Ultra |
|---|---|---|---|---|
| Domains | 1 | 3 | 10 | 50 |
| Subdomain discovery | -- | Yes | Yes | Yes |
| Technology detection | -- | -- | Yes | Yes |
| CVE scanning | -- | -- | -- | Yes |
| Cloud accounts (AWS/Azure) | -- | -- | -- | Yes |
| Repository scanning | -- | Yes | Yes | Yes |
| Endpoint collections | Yes | Yes | Yes | Yes |
Enterprise plans include unlimited assets of all types.