Fluid Attacks' support in the vulnerability remediation process is through
custom and automated fixes generated by AI from its platform and
VS Code extension. Additionally, Fluid Attacks' feature called "
Talk to a Pentester" allows you to meet with an expert for help understanding vulnerabilities. Further, Fluid Attacks offers a
CI agent to prevent your development team from deploying software versions with unmanaged vulnerabilities, thus helping to enforce your policies and urge the development team to fix the software security issues.
Needed supplies
- Version control system with Git technology
- Internet access to code repositories, with read and clone privileges (if access is through a private network, its proper configuration and credentials are needed)
- URLs of the environments and/or installers for mobile apps (.apk, .ipa) to test
- Access credentials to every application (for each role to test)
- Access permissions to the integration environment
Ideally, all system credentials should be usable from Linux without human intervention.
Scope
The scope of testing is defined by the active elements within it. Specifically, it is made up of active repositories and mobile environments registered on the platform, excluding those URLs and endpoints expressly excluded by the client. Furthermore, if an unexpected endpoint is identified in the code, the client's authorization is needed to include it within the scope.
Verification of security requirements
Fluid Attacks Continuous Hacking reviews the client's compliance with all the
security requirements carefully curated from several important international standards. These checks are mandatory and not customizable, as the solution is designed for comprehensive testing. The client can alternatively use the Fluid Attacks CLIs for
targeting specific weaknesses, which are linked to requirement violations.