Install the IntelliJ plugin | Fluid Attacks Help

Install the IntelliJ plugin

Fluid Attacks' IntelliJ plugin enables you to view the following directly on IntelliJ IDEA:
  1. A list of the types of vulnerabilities and their specific cases that Fluid Attacks has identified so far in the source code of your products.
  2. The specific lines of code in which a vulnerability detected by Fluid Attacks' tools or hacking team is present.
To install the plugin please follow these steps:
  1. Go to JetBrains Marketplace and use the search bar to look for 'Fluid Attacks'.
  2. Search Fluid Attacks plugin on JetBrains Marketplace

    Alternatively, on IntelliJ IDEA, open your settings and click on Plugins, then search for 'Fluid Attacks' in the Marketplace tab.

  3. Click on the search result to be directed to the Fluid Attacks plugin page. There, click the Get button.
  4. Download the Fluid Attacks IntelliJ plugin

    If installing the plugin from the IDE, click the Install button next to the search result. When it is done, restart IntelliJ IDEA.

  5. Log in to Fluid Attacks' platform.

  6. Generate and copy an API token from the platform (for detailed instructions, see Generate or revoke the API Token).
  7. Find API token option on the Fluid Attacks platform

  8. Go to IntelliJ IDEA and click on the Fluid Attacks tab on the left side of the IDE, then paste the API token in the provided field and click on Add Token.
  9. Add Fluid Attacks token on IntelliJ IDEA

Upon providing the token, the tab reloads and shows you a tree view with the vulnerable locations in your repository, categorized by type of vulnerability. Clicking on a location takes you to the relevant line(s) in the respective file.

View vulnerable code with the Fluid Attacks IntelliJ pl
Free trial message
Free trial
Search for vulnerabilities in your apps for free with Fluid Attacks' automated security testing! Start your 21-day free trial and discover the benefits of the Continuous Hacking Essential plan. If you prefer the Advanced plan, which includes the expertise of Fluid Attacks' hacking team, fill out this contact form.