Accept vulnerabilities | Fluid Attacks Help

Accept vulnerabilities

The Acceptance section in Policies shows the weaknesses that your team has requested be permanently and temporarily accepted. Accepting vulnerabilities means acknowledging and tolerating their associated risks. The policies approved here apply to reports across all the groups within your organization.
Warning on vulnerability acceptance
Accepted vulnerabilities are ignored by Fluid Attacks's CI Agent during build checks. You assume the risk associated with allowing these vulnerabilities into production.

Accept vulnerabilities permanently

The first table in Acceptance lists the weaknesses your team has suggested for permanent acceptance, as well as the request status ('Approved', 'Rejected', 'Requested', or 'Inactive'), the request date, and any tags for classification added by the person who made it. Organization Managers can see in the Action column with the options to manage permanent acceptance.

View permanent acceptance policies on the Fluid Attacks platform

Submit a weakness to accept

Role requirement info
Role required: User or Organization Manager
Any team member can make the approval request, but only Organization Managers can approve or reject it. To add a weakness, follow these steps:
  1. Click on the Add weakness button. This makes a pop-up window appear for you to select the weakness you want to submit for acceptance.

  2. Submit permanent acceptance policy on the Fluid Attacks platform

    In case the request has already been made, it is displayed as unavailable, and you are informed of the request status.
    See unavailable request on the Fluid Attacks platform

  3. Optionally, add one or more tags for classification.

  4. Click on the Request button to submit the request.
  5. Accept vulnerability permanently on the Fluid Attacks platform

Upon clicking the Request button, the weakness appears in the table with 'Requested' in the Request status column.
Note on automatic approval
If you have the Organization Manager role, your submission is automatically approved.

Approve and reject acceptance requests

Role requirement infoRole required: Organization Manager
The Action column presents you with options to manage acceptance requests. Those in the 'Requested' status show you the Pending approval button. Manage them as follows:
  1. Approve: You approve the request, causing that every vulnerability that matches the type, or type-tag combination, is accepted with no additional approvals needed. This changes the request status from 'Requested' to 'Approved'.
  2. Reject: Your reject the request. This changes its status to 'Rejected'.

Approve and reject acceptance requests on the Fluid Attacks platform

Reactivate and deactivate acceptance policy

Role requirement info
Role required: Organization Manager
For requests whose status is 'Approved', 'Rejected' and 'Inactive', the Action column presents you with the Manage button. Manage these requests as follows:
  1. Click on Request to reactivate acceptance.

    Reactivate acceptance policy on the Fluid Attacks platform

    You have to confirm the action. Doing so changes the policy status from 'Rejected' or 'Inactive' to 'Approved'.

    Confirm policy reactivation on the Fluid Attacks platform

  2. Click on Deactivate to stop accepting the weakness.

    Deactivate acceptance policy on the Fluid Attacks platform

    Upon clicking the button, a pop-up window appears asking for confirmation. By clicking on Confirm, this policy's status changes from 'Approved' to 'Inactive'.

    Confirm policy deactivation on the Fluid Attacks platform

Add tags to classify vulnerabilities for acceptance

Role requirement infoRole required: User or Organization Manager
When submitting a weakness in Acceptance, you can add one or more tags to classify it. These tags are meant to help you find information fast in future searches and allow you to do analyses using categories that your team finds meaningful. For the latter, Fluid Attacks offers the analytics Tags by groups and Weaknesses by tags.

Accept vulnerabilities temporarily

Role requirement info
Role requirements for submitting, approving, rejecting, deactivating and reactivating policies are the same as for permanent acceptance of vulnerabilities. See details above.
The second table in Acceptance shows the weaknesses your team has suggested for temporary acceptance, as well as the corresponding request status, date and tags. Additionally, Organization Managers are offered multiple options to manage requests.

View temporary acceptance policies on the Fluid Attacks platform

A temporary acceptance policy can be created for an individual weakness or all vulnerability types:

  1. To submit a request for one weakness, click on Add weakness, select the weakness and click the Request button. You can optionally add tags. Bear in mind that you can only choose among the weaknesses for which a request has not been made.

    Request temporary acceptance policy on the Fluid Attacks platform

  2. Advice on accepting multiple vulnerabilities
    In this window you may select more than one weakness. Once you select at least one, you are told how many weaknesses are included in your request.
    Upon clicking Request, the policy appears in the table with the 'Requested' status. Only a member with the Organization Manager role can approve or reject it.

    See submitted temporary acceptance policies on the Fluid Attacks platform

  3. To submit a request for all weaknesses, select All vulnerability types after clicking on the Weakness field, then add tags (optional) and click on the plus button.
  4. Caution on accepting all types
    By creating this policy, you acknowledge and temporarily tolerate the risks of all weaknesses detected in your system.

    Request temporary acceptance of all vulnerabilities on the Fluid Attacks platform
Note on automatic approvalNote: Submissions by Organization Managers are automatically approved.
Members with the Organization Manager role can manage temporary acceptance from the Action column as follows:
  1. Pending approval > Approve to start accepting the weakness
  2. Pending approval > Reject to disallow acceptance of the weakness
  3. Manage > Request to activate acceptance of the weakness
  4. Manage > Deactivate to stop accepting the weakness
Free trial message
Free trial
Search for vulnerabilities in your apps for free with Fluid Attacks' automated security testing! Start your 21-day free trial and discover the benefits of the Continuous Hacking Essential plan. If you prefer the Advanced plan, which includes the expertise of Fluid Attacks' hacking team, fill out this contact form.