Originally posted by: Joel R.
Hi Kahn,
Those appear to be input files that are used with our FLRT Vulnerability Checker (FLRTVC), available through the FLRT website.
However, we do not generate any input files through our FLRT tools directly. Indirectly, those files are generated by the users of our tool, or through IBM services like Call Home, which is setup on the HMC. I'm not familiar with your environment, so it is difficult to identify the source.
Does your team use any automated services that collect inventory?
Please share any other information that may help.
Thanks!
Joel