The group availability metric displays the percentage of time the group has had unresolved events throughout its entire existence. Events are situations that prevent Fluid Attacks' tool or hacking team from conducting security testing on part of the group's scope or its entirety. This information provides a quick overview of the group's promptness in guaranteeing the conditions required for complete assessments.
This chart shows the number of days each event in your group has remained unresolved. This information helps you prioritize long-standing issues.
This chart shows the times each of your tags are used in multiple of the reported types of vulnerabilities. This helps you analyze security issues in your group using categories that are especially significant for your team.
By enabling the CI Agent, you can verify the status of security vulnerabilities on your system. You can embed this application, which is offered as a Docker container, into your continuous integration system to benefit from the following:
You would be running fast and automatic scans on the code you just wrote.
You can (optionally) set the CI Agent to flag the build as failed if it finds any noncompliance with your organization policies or group-specific policies. This strict mode can be customized with severity thresholds and grace periods according to your team's needs.
Statistics from over a hundred different systems show that breaking the build with the CI Agent increases the remediation ratio and speed, helping you build a safer system and save on remediation costs throughout your software security development lifecycle (SDLC).
This is an indication of whether Fluid Attacks' CI Agent is currently Active or Inactive.
This figure is the number of times your team has run the CI Agent to proactively check the status of vulnerabilities in your builds.
This figure is the number of repositories and branches you check with the CI Agent.
The CI Agent's primary objective is to serve as gatekeeper for your team's deployments. Your team is responsible for important vulnerability management settings affecting the agent's behavior such as the following:
This chart shows the number CI Agent executions with strict mode enabled and that for executions that found accepted vulnerabilities. This information helps your team create goals for the accepted risk to be low and for the usage of strict mode to be high.
This chart shows the number CI Agent executions (detailed in the group's DevSecOps section) in which vulnerabilities were found and those in which there were none. This information helps you understand how well you are avoiding risky deployments.