Skip to main content
Every Panguard Scan produces a single risk score from 0 to 100 and an associated letter grade from A to F. This page explains how the score is calculated and what each grade means.

Score Display

Score: 62/100 [████████████░░░░░░░░] Grade: C
The score represents a safety score: higher is better. It is calculated as 100 - totalRiskPoints, clamped to the 0—100 range.

Grade Thresholds

GradeScore RangeInterpretation
A90 — 100Excellent. Minimal risk. All critical and high issues resolved.
B75 — 89Good. A few medium-severity items remain.
C60 — 74Fair. Multiple findings need attention.
D40 — 59Poor. Significant security gaps present.
F0 — 39Critical. Immediate remediation required.

Scoring Factors

The risk score is derived from the severity and quantity of findings across all scanners. Each finding contributes penalty points based on its severity:
SeverityPoints per Finding
CRITICAL15
HIGH10
MEDIUM5
LOW2
INFO0
Points are summed and subtracted from 100. The resulting value is clamped to a minimum of 0.

Example Calculation

FindingSeverityPoints
SSH on 0.0.0.0HIGH10
Weak password policyMEDIUM5
Expired SSL certCRITICAL15
No firewallHIGH10
Outdated kernel (CVE)MEDIUM5
Total45
Safety Score = 100 - 45 = 55 (Grade: D)

Score Categories

Beyond the single number, the score is contextualized across 8 categories:
CategoryWhat It Measures
SystemOS patch level, kernel version, architecture
NetworkOpen ports, binding addresses, firewall status
AuthenticationPassword policy strength, account lockout
EncryptionSSL/TLS certificates, cipher suites, key strength
Access ControlShared folders, file permissions, anonymous access
ServicesRunning services, unnecessary daemons
Scheduled TasksCron jobs, suspicious scripts, persistence vectors
Security ToolsPresence of AV, IDS, firewall, audit daemon

Improving Your Score

1

Fix CRITICAL findings first

Each critical finding costs 15 points. Resolving just one can move your grade up a full letter.
2

Address HIGH findings

High-severity items are the next priority at 10 points each.
3

Review MEDIUM findings

These are typically configuration improvements that accumulate.
4

Re-scan to verify

Run panguard scan again after making changes to confirm your new score.
Run panguard scan --json to get machine-readable output that includes per-finding scores, making it easy to integrate into CI/CD pipelines.