Report Builder
The Report Builder generates professional security assessment reports from your workspace data. Reports are scoped to individual networks and include vulnerability summaries, severity distributions, affected hosts, and detailed findings with proof of exploitation. Output is a downloadable DOCX file that can be customized with your branding, client details, and supporting artifacts.
How It Works
When you generate a report, Hawkra aggregates all vulnerability data for the selected network: which assets are affected, on which ports, at what severity, and with what proof. This data is merged into a DOCX template that produces a structured security assessment document ready for client delivery.
The report engine handles encryption transparently -- any encrypted notes or proof data stored in your workspace is decrypted on the fly during report generation, so the final document contains the cleartext findings.
Report Contents
A generated report includes the following sections:
- Cover Page -- Client name, company name, report version, and generation date.
- Vulnerability Summary -- Total counts by severity (Critical, High, Medium, Low) and the most common vulnerabilities found.
- Severity Distribution -- A breakdown showing how vulnerabilities are distributed across severity levels.
- Affected Hosts -- A listing of all assets in the network with their IP addresses, hostnames, MAC addresses, and descriptions.
- Detailed Findings -- Each vulnerability with its full details:
- Name, CVE, and CWE identifiers
- Severity level
- Description and impact assessment
- Affected hosts and ports
- Proof of exploitation (from attached evidence)
- Recommended fixes and references
- Artifact Appendix -- Any supporting images or evidence files you attach during report generation.
Vulnerabilities in the report are sorted by severity (Critical first) and then by the number of affected hosts within each severity level.
Customization Options
Required Fields
| Field | Description |
|---|---|
| Client Name | The name of the client receiving the report (max 255 characters). |
| Company Name | Your company or team name for the report header (max 255 characters). |
Optional Fields
| Field | Description |
|---|---|
| Report Version | A version string for the report, such as "1.0" or "Draft" (default: "1.0", max 50 characters). |
| Critical Finding Summary | A free-text executive summary highlighting the most critical findings (max 10,000 characters). |
Custom Logo
Upload your company logo to brand the report. The logo must be an image file (PNG, JPEG, etc.) and is placed on the cover page. Upload the logo file to your workspace first, then reference it during report generation.
Custom report logos require a Premium subscription. Free-tier users can generate reports without custom branding.
Artifact Attachments
You can attach supporting evidence to the report as artifacts. These can be:
- Documents -- Files uploaded to your workspace's document library (category "Other").
- Proofs -- Screenshots and evidence files attached to specific vulnerability-asset associations.
Only image files (PNG, JPEG, etc.) are included in the generated report. Non-image artifacts are skipped. Each artifact appears in the report with its name and description.
Generating a Report
- Navigate to your workspace and select the network you want to report on.
- Open the Report section.
- Fill in the Client Name and Company Name.
- Optionally set the Report Version and write a Critical Finding Summary.
- Optionally upload and select a custom logo.
- Optionally attach artifact files for supporting evidence.
- Click Generate Report.
- The report is generated server-side and returned as a downloadable DOCX file.
Downloading Reports
Once generation completes, the report downloads automatically. The filename follows the pattern:
{NetworkName}_Network_Report_{YYYYMMDD}.docx
For example: Production_LAN_Network_Report_20260303.docx
Report Limits
Report generation is subject to tier-based monthly limits:
| Tier | Monthly Reports |
|---|---|
| Free | Limited (check your plan details) |
| Premium | Unlimited |
| Self-Hosted | Unlimited |
When you reach your monthly limit, Hawkra displays a message indicating how many reports you have used and suggests upgrading for unlimited access.
Generate reports after completing your vulnerability assessment and remediation verification. This ensures the report reflects the most current state of the network.
Use the Critical Finding Summary field to write an executive-level overview. This is often the first section a client reads, so highlight the most impactful findings and their business risk.
Generating reports requires the EditAssets permission. Viewing report data (without generating) requires ViewAssets.