Groups correspond to single projects that our clients create to manage their vulnerabilities separately. You may have several groups corresponding to separate applications, infrastructure or source code. When you create a group, the ethical hackers at Fluid Attacks start assessing it in search for vulnerabilities.
In the Groups view, you will find Scope Overview, which will give you global and visible information on the total of repositories and authors you have in Fluid Attacks' platform. You will find the following fields:
Clicking on any of these four boxes will redirect you to the Outside section. If you want to know more about this section, click here.
In the group table, you find all the groups you have access to within your organization. This table has seven columns, each of which allows you to organize the list content alphabetically (either ascending or descending) if you click on the arrows next to each title.
You find the following information:
When you enter a group, following the link in its name, you can see its detailed information in different subsections, which will vary depending on your role and the plan you have for that group.
When you enter one of the groups with at least one unsolved event, you can notice a red dot in the Events tab, which works as a warning signal that something requires your intervention.
When you click that tab, you see the event table with a Status column showing for each event whether it is solved (in green), unsolved (in red) or pending (in yellow).
If you want to know more about the event section, you can enter here.