Criteria
|
Fluid Attacks Essential
|
Fluid Attacks Advanced
|
YesWeHack
|
Focus | |||
Extras | None | Same as the Essential plan | |
Employees | Same as the Essential plan | ||
Reputation | Between 8.89 and 9.71 based on 36 reviews over 6.3 years from the following three sources: Clutch, Gartner Peer Insights and PeerSpot | Same as the Essential plan | Between 8.76 and 9.44 based on 52 reviews over 3.2 years from the following eight sources: Capterra, Clutch, G2, Gartner Peer Insights, GetApp, PeerSpot, Software Advice and TrustRadius. |
Followers | 18K based on the following social media: Facebook, Instagram, LinkedIn, X and YouTube | Same as the Essential plan | |
Citing research firms | None | Same as the Essential plan | |
Founded | Same as the Essential plan | ||
Funding | Bootstrapping | Same as the Essential plan | |
Revenue | Same as the Essential plan | ||
CVE | Fluid Attacks has identified 257 CVEs published in the MITRE database, ranking among the top 10 awesome CVELabs globally. | Same as the Essential plan | 0 |
Compliance | Same as the Essential plan | ||
Documentation | Same as the Essential plan | Yes | |
Status page | Same as the Essential plan | ||
Incidents | Same as the Essential plan | ||
Visits | Same as the Essential plan | ||
Authority | Same as the Essential plan | ||
Distribution | Same as the Essential plan | ||
Marketplaces | Same as the Essential plan | None | |
Freemium | No | Same as the Essential plan | No |
Free trial | No | ||
Demo | Same as the Essential plan | ||
Price communication | |||
Pricing drivers | Groups on the platform | Authors (contributing developers) | |
Deployment | Same as the Essential plan | ||
Open source | No | ||
Standards | Fluid Attacks Essential validates some requirements based on these standards and guidelines: Agile Alliance, BSIMM, BIZEC-APP, BSAFSS, CAPEC™, CASA, C2M2, CCPA, CERT-C, CERT-J, CIS, CMMC, CPRA, CWE™, CWE TOP 25, ePrivacy Directive, FACTA, FCRA, FedRAMP, FERPA, FISMA, GDPR, GLBA, HIPAA, HITRUST CSF, ISA/IEC 62443, ISO/IEC 27001, ISO/IEC 27002, ISSAF, LGPD, MITRE ATT&CK, MISRA-C, MVSP, NERC CIP, NIST 800-53, NIST 800-63B, NIST 800-115, NIST 800-171, NIST CSF, NIST SSDF, NYDFS, NY SHIELD Act, OSSTMM3, OWASP API Security Top 10, OWASP ASVS, OWASP MASVS, OWASP-M TOP 10, OWASP SAMM, OWASP SCP, OWASP Top 10 Privacy Risks, OWASP TOP 10, PA-DSS, PCI DSS, PDPA, PDPO, POPIA, PTES, Resolution SB 2021 2126, SANS 25, SIG Core, SIG Lite, SOC2®, SWIFT CSCF, WASC and WASSEC. | Fluid Attacks Advanced validates all the requirements according to the same standards and guidelines as the Essential plan. | |
Detection method | Hybrid (automated tools + AI + human intelligence) | Automated tools (attack surface management platform) + human intelligence as part of their bug bounty offering. | |
Accuracy
|
Fluid Attacks' SAST tool achieved the best possible result against the OWASP Benchmark: a TPR (True Positive Rate) of 100% and an FPR (False Positive Rate) of 0%.
|
Fluid Attacks identifies 90% of the evaluated systems' risk exposure. (Accuracy is calculated with the F1 score. Risk exposure is calculated with the formula CVSSF=4^(CVSS-4).)
|
No information available |
Fast and automatic | Same as the Essential plan | ||
AI | Using GenAI, Fluid Attacks Essential generates custom fixes from the IDE or ASPM that explain how to remediate vulnerabilities, and automated fixes that provide patches to serve as an initial draft for a pull request that fixes a vulnerability. | Using artificial intelligence, Fluid Attacks Advanced prioritizes potentially vulnerable files for assessment. Its AI is specially trained by machine learning (ML) with thousands of snippets of vulnerable code. | None |
Remediation | Fluid Attacks Essential provides detailed documentation on fixes and features both on its platform and in its VS Code extension, which uses generative AI to offer custom step-by-step correction guidance. The extension also leverages generative AI to provide automated fix capabilities. Additionally, there is a knowledge base with examples of remediation available. | In addition to the Essential plan features, Fluid Attacks Advanced offers the option of "Talk to a hacker" in which its experts help clients understand the most challenging vulnerabilities, which helps as a basis to figure out remediation. | They provide a remediation guide for the vulnerabilities identified and reported during the penetration testing process. |
Outputs | Fluid Attacks Essential's evidence is delivered in (a) PDF executive reports, (b) XLSX technical reports, (c) code pieces, (d) graphs and metrics of the system's security status and (e) a Software Bill of Materials (SBOM) exportable in CycloneDX or SPDX formats, with options to download in JSON or XML. | Fluid Attacks Advanced delivers all the types of evidence mentioned in the Essential plan, and additionally, (a) video recordings of the attack and (b) screenshots with explanatory annotations. | YesWeHack's evidence is delivered in (a) PDF reports, (b) CSV reports, (c) XLS reports, (d) JSON reports and (e) graphs and metrics. |
PTaaS | No | No | |
Reverse engineering | No | ||
Secure code review | No | No information available | |
Pivoting | No | Yes. By combining vulnerabilities A and B, Fluid Attacks Advanced discovers a new, higher impact vulnerability C. | No information available |
Exploitation | No | Yes. Fluid Attacks Advanced can do exploitation as long as the client provides an available environment. | YesWeHack can do exploitation as part of its bug bounty offering. |
Zero-day vulnerabilities | None | Fluid Attacks Advanced's security researchers search for zero-day vulnerabilities in open-source software. | YesWeHack has a platform where any security researcher can responsibly disclose and report zero-day vulnerabilities. |
SLA | |||
Accreditations | Same as the Essential plan | ||
Hacker certifications | Not applicable | Pending | |
ASPM | Same as the Essential plan | No | |
IDE | The IDE extensions provide detailed information on vulnerabilities and remediation recommendations and leverages generative AI to offer automated fixes and generate customized step-by-step remediation guides. | Same as the Essential plan | None |
CLI | Yes. Fluid Attacks' free, open-source scanner can function as a command-line interface (CLI) tool. | Same as the Essential plan | None |
CI/CD security | Fluid Attacks Essential can integrate with CI/CD systems and trigger a build pipeline failure to prevent from deploying a noncompliant software version into production (break the build). | Same as the Essential plan | None |
SCA | Yes. Fluid Attacks Essential supports the following package managers: Cargo, Composer, Conan, Docker Images, GitHub Actions, Go, Gradle, Hex, Maven, NPM, NuGet, pNPM, pip, Poetry, Pub, RubyGems, SBT, SwiftPM and Yarn. | Same as the Essential plan | No |
Reachability | Yes. The Fluid Attacks tool's reachability module is currently available for direct dependencies in the following languages: JavaScript, Python and TypeScript | Same as the Essential plan | No |
SBOM | Yes. Fluid Attacks Essential supports supply chain analysis for the following package managers: Alpine Package Keeper (apk), APK (Android Package), Bundler (Ruby), Cargo (Rust), CocoaPods (Swift), Composer (PHP), Dart Pub (Dart), dpkg (Debian), Gradle (Java), Hex (Elixir), Maven (Java), NPM (JavaScript), Pacman (Arch Linux and derivatives), PECL (PHP), Pip (Python), Pipenv (Python), PNPM (JavaScript), Poetry (Python), RPM (Redhat), Swift Package Manager (Swift) and YARN (JavaScript). | Same as the Essential plan | No |
Containers | Yes. Fluid Attacks Essential scans containers based on the following distributions: Alpine, Arch, Debian, and RedHat. | Same as the Essential plan | No |
Source SAST (languages) | Yes. Fluid Attacks Essential supports the following languages and technologies: Android, C#, CloudFormation, Configuration files, Dart, Docker, Docker Compose, Go, HTML, HTML5, jBASE, Java, JavaScript, Kotlin, Kubernetes, PHP, Python, Razor, Shell Scripting, Storybook, Swift, Terraform, TypeScript and YAML. | Yes. Fluid Attacks Advanced supports all languages and technologies supported in the Essential plan, as well as the following: ABAP, ActionScript, Apex, Assembler, ATS, Awk, C, C++, Clean, ClojureScript, Colm, cScript, Dale, Elvish, F#, Falcon, Fish, Fortran, Guile, Hana SQL Script, Haskell, Haxe, Idris, Ion, Janet, JCL, Joker, JScript, JSP, Lisp, Lobster, Natural, Nim, Objective C, Pascal, Perl, PL-SQL, PL1, PL/SQL, PowerScript, PowerShell, Prolog, R, RC, RPG4, Rust, Scala, SQL, SQR, Standard ML, T24, TAL, tcsh, Transact-SQL, VB.NET, VBA, VisualBasic 6, XML, among others. | No |
Source SAST (frameworks) | Yes. Fluid Attacks Essential supports the following frameworks: .NET, .NET Core, Angular, ASP.NET, Bootstrap, Django, Express, FastAPI, Flask, Flutter, Ktor, Laravel, Nest, Next.js, Node.js, React Native, React.js, Spring, Spring Boot and Vue.js. | Yes. Fluid Attacks Advanced supports all frameworks supported in the Essential plan, as well as the following: Apache Struts, Ember.js, Gatsby, Meteor, Phoenix, Ruby Sinatra, Ruby on Rails, Svelte, Symfony, Tornado, among others. | No |
Binary SAST
|
Yes. Fluid Attacks Essential supports APK files.
|
Same as the Essential plan
|
No
|
DAST
|
Yes. Fluid Attacks Essential scans unauthenticated HTTP endpoints, including headers, DNS records, HTML content, and SSL connections for encryption suites, protocols, and X509 certificates.
|
Same as the Essential plan
|
No
|
IAST
|
No
|
Same as the Essential plan
|
No
|
CSPM | Same as the Essential plan | No | |
Secrets | Yes. Fluid Attacks Essential detects secrets in API keys, AWS credentials, database connection passwords, express-session secrets, hardcoded emails (in security-related contexts), hardcoded environment variables (e.g., api_key, password, secret), hardcoded secrets in cryptographic calls, JWT, private keys, RSA keys, salts, SSH keys, symmetric keys, initialization vectors, SonarQube tokens and passwords (in identifiable fields). | Yes. Fluid Attacks Advanced's capability is equal to that of the Essential plan, with the addition of manual reviews to verify other attack vectors and the exploitability of secrets. | No |
SCM integrations | Same as the Essential plan | None | |
Binary repositories integrations | None | Same as the Essential plan | None |
Ticketing integrations | Same as the Essential plan | ||
ChatOps integrations | None | Same as the Essential plan | Slack |
IDE integrations | IntelliJ IDEA and VS Code | Same as the Essential plan | None |
CI/CD integrations | AWS CodePipeline, Bamboo, CircleCI, GitHub Actions, GitLab CI, Jenkins, TeamCity, Travis CI, and any other CI/CD system that supports Docker | Same as the Essential plan | None |
SCA integrations | Native scanner (included, no integration needed) | Same as the Essential plan | None |
Container integrations | Native scanner (included, no integration needed) | Same as the Essential plan | None |
SAST integrations | Native scanner (included, no integration needed) | Same as the Essential plan | None |
DAST integrations | Native scanner (included, no integration needed) | Same as the Essential plan | None |
IAST integrations | None | Same as the Essential plan | None |
Cloud integrations | Same as the Essential plan | None | |
CSPM integrations | Native scanner (included, no integration needed) | Same as the Essential plan | None |
Secrets integrations | Native scanner (included, no integration needed) | Same as the Essential plan | None |
Compliance integrations | None | Same as the Essential plan | None |