I would like to suggest adding a dedicated field in the vulnerability reporting section to map each finding to its corresponding MITRE ATT&CK technique ID (e.g., T1190 – Exploit Public-Facing Application).
While I understand that this might not be strictly necessary for all use cases, I believe it would provide significant added value by giving a clearer tactical context to each vulnerability.
Thank you for considering this enhancement, as it would bring additional context and value to SysReptor reports.