The spectrade and meltdown tester is a simple shell script, which states that your system Linux installation is "sensitive" against the "speculative execution" CVEs, which was made public in early 2018.
Without options, you will observe the ongoing kernel. You can also specify the kernel image on the command line, if you want to inspect a kernel that you are not running.
Regardless of the lipated kernel version number, the script will do its best to detect mitigations including backpacked non-vanilla patches.
Summary of CVS Ghost and Meltdown Checker
CVE-2017-5753 border check bypass (spectrate version 1)
Effects: Kernel and All Software
Mitigation: Recompiling the software and kernel with a modified compiler that introduces LFENCE opcode in the appropriate position in the resulting code
Effects of Quenching Performance: Negligible
CVE-2017-5715 branch target injection (spectra variant 2)
Effects: Kernel
Mitigation 1: Through the microcode update, the new OPOD should be used by the updated compiler to protect BTB (by flushing indirect branch launcher)
Metagenation 2: Initiating the "Retopoline" in the compiler and compiling the software / OS with it
Effects of mitigation performance: Depending on your CPU, high for quenching 1, medium of quenching 2
CVE-2017-5754 crooks data cache load (meltdown)
Effects: Kernel
Mitigation: Updating kernel (with PTI / KPTI patch), updating the kernel is enough
Effects of quenching performance: low to moderate
There are some common bash scripts like security scanning: