Identify and address vulnerabilities from IntelliJ | Fluid Attacks Help

Identify and address vulnerabilities from IntelliJ

Fluid Attacks' IntelliJ IDEA plugin offers the following functions:

To access the above functions, click on the Fluid Attacks extension in the IDE's left-side menu.

Advice on installing the IntelliJ extension
Not using extension yet? Install it.

See vulnerable file and code line

You can view vulnerabilities reported in the Fluid Attacks platform from the IntelliJ IDEA:

  1. Click on the Fluid Attacks icon in the left-side menu. You are then presented with a comprehensive list of weaknesses detected in your code.

    See weaknesses detected by Fluid Attacks from IntelliJ IDEA

  2. Click on the weakness of your interest to view the names and vulnerable lines of all affected files.

    View vulnerable files reported by Fluid Attacks from IntelliJ
  3. Select a file of your interest to identify the line of code where the vulnerability is present, which is underlined with red.

    View vulnerable line detected by Fluid Attacks from IntelliJ

Get AI generated remediation guides

Warning
Always check remediation advice generated with AI.

Fluid Attacks' IntelliJ IDEA plugin uses AI to generate fix suggestions. The Custom Fix feature generates a step-by-step guide telling you how to fix your code. Here is how you access it:
  1. Click on the Fluid Attacks icon in the IDE's left-side menu.

  2. Expand the weakness you wish to explore by clicking on its name.

  3. Right-click on a vulnerable file and choose the Get Custom Fix option.

    Use Custom Fix on the Fluid Attacks IntelliJ plugin

  4. The corresponding editor tab appears and starts displaying the remediation guide.

    Get remediation guide on the Fluid Attacks IntelliJ plugin

Free trial messageFree trial
Search for vulnerabilities in your apps for free with Fluid Attacks' automated security testing! Start your 21-day free trial and discover the benefits of the Continuous Hacking Essential plan. If you prefer the Advanced plan, which includes the expertise of Fluid Attacks' hacking team, fill out this contact form.