-kernel.unprivileged_bpf_disabled |sysctl | 1 | kspp |cut_attack_surface| OK
-kernel.kptr_restrict |sysctl | 1 | kspp |cut_attack_surface| FAIL: "0"
-kernel.yama.ptrace_scope |sysctl | 1 | kspp |cut_attack_surface| FAIL: "0"
-
-[+] Config check is finished: 'OK' - 118 / 'FAIL' - 122
+kernel.unprivileged_bpf_disabled |sysctl | 1 | kspp |cut_attack_surface| FAIL: "2"
+kernel.kptr_restrict |sysctl | 2 | kspp |cut_attack_surface| FAIL: "1"
+dev.tty.legacy_tiocsti |sysctl | 0 | kspp |cut_attack_surface| FAIL: is not found
+vm.unprivileged_userfaultfd |sysctl | 0 | kspp |cut_attack_surface| OK
+kernel.modules_disabled |sysctl | 1 | clipos |cut_attack_surface| FAIL: "0"
+fs.protected_symlinks |sysctl | 1 | kspp | harden_userspace | OK
+fs.protected_hardlinks |sysctl | 1 | kspp | harden_userspace | OK
+fs.protected_fifos |sysctl | 2 | kspp | harden_userspace | FAIL: "1"
+fs.protected_regular |sysctl | 2 | kspp | harden_userspace | OK
+fs.suid_dumpable |sysctl | 0 | kspp | harden_userspace | FAIL: "2"
+kernel.randomize_va_space |sysctl | 2 | kspp | harden_userspace | OK
+kernel.yama.ptrace_scope |sysctl | 3 | kspp | harden_userspace | FAIL: "1"
+
+[+] Config check is finished: 'OK' - 121 / 'FAIL' - 139