Product roadmap | Fluid Attacks Help

Product Roadmap

See where we are going together

We’re excited to share our priorities and upcoming features, designed to enhance security, simplify workflows, and empower you with greater efficiency and transparency.

Priority

Vulnerabilities view

Easily manage all vulnerabilities—both inherited and injected—through a unified tab. This consolidated view simplifies workflows, reduces confusion, and ensures an intuitive user experience, allowing you to focus on addressing risks rather than navigating disparate tools.

Inherited vulnerabilities treatment

Assess the risk for all inherited vulnerabilities to ensure comprehensive coverage of your Software Development Life Cycle (SDLC). This approach minimizes security gaps, preserves development integrity, and ensures that your projects are robust against potential threats.
 

Supply Chain

Support for package manager extensions

Seamlessly integrate with various package managers to enhance functionality and streamline workflows. This feature saves time and effort, enabling faster dependency management and a smoother development experience.

Languages and extensions
.NET
  1. .csproj SUPPORTED
  2. .exe.config COMING SOON
  3. packages.config SUPPORTED

C++
  1. conan.lock SUPPORTED
  2. conanfile.py COMING SOON
  3. conanfile.txt COMING SOON

Dart
  1. pubspec.yaml COMING SOON

Elixir
  1. mix.exs COMING SOON
  2. mix.lock SUPPORTED

Go
  1. go.mod COMING SOON

HTML
  1. .html (script tags) SUPPORTED

Java
  1. .gradle SUPPORTED
  2. build.gradle.kts SUPPORTED
  3. .xml (Maven pom.xml) SUPPORTED
  4. gradle-wrapper.properties COMING SOON
  5. build.sbt COMING SOON

JavaScript
  1. package-lock.json SUPPORTED
  2. package.json SUPPORTED
  3. pnpm-lock.yaml SUPPORTED
  4. yarn.lock SUPPORTED

PHP
  1. composer.json SUPPORTED
  2. composer.lock SUPPORTED

Python
  1. .txt (pip requirements) SUPPORTED
  2. Pipfile SUPPORTED
  3. Pipfile.lock SUPPORTED
  4. pyproject.toml SUPPORTED

Ruby
  1. Gemfile SUPPORTED
  2. Gemfile.lock SUPPORTED
  3. gems.locked SUPPORTED

Rust
  1. Cargo.lock SUPPORTED
  2. Cargo.toml SUPPORTED

Swift
  1. Package.resolved SUPPORTED

SBOM (software bill of materials)
  1. .json (SPDX/CycloneDX) COMING SOON
  2. .xml (SPDX/CycloneDX) COMING SOON

Report on malware dependencies

Generate detailed reports identifying malicious dependencies in your projects. Early detection empowers you to address these risks proactively, safeguarding system integrity and protecting your software from exploitation.

SBOM for Docker images

Automatically generate Software Bill of Materials (SBOMs) for registered Docker images, including their dependencies and operating system components. Full visibility into your Docker images promotes transparency, ensures traceability, and enhances your ability to manage security risks effectively.

Report on development dependencies

List all development dependencies, including those outside production code, to identify vulnerabilities (CVEs) and secure every aspect of your environment. This proactive approach ensures comprehensive risk management across all dependencies.

Differentiate between direct and transitive dependencies

Clearly distinguish between direct and transitive dependencies in the dependency tree. Enhanced visibility helps prioritize fixes, assess risks, and maintain a more secure and manageable dependency structure.


Streamline Resource Management

Environments URL

Move environments and associated resources between roots and groups with a single action. This flexibility helps adapt to changing operational needs, saving time and ensuring that resource organization aligns with team workflows.

To-Do

Default columns

Expand default views to include additional columns, offering comprehensive information upfront. Having critical details at a glance boosts productivity and enables faster, more informed decision-making.


Platform redesign

Columns, filters and tables

Experience a cleaner, more intuitive interface with improved navigation and responsiveness. A redesigned platform reduces cognitive load, enhances accessibility, and keeps users focused on their tasks. Improved performance ensures a seamless experience, increasing satisfaction and overall productivity.

Audit and Compliance

Audit Logging

Enable detailed audit logging to capture and track user actions, changes to configurations, and system events. This feature supports compliance requirements, enhances accountability, and provides a clear record for investigating security incidents or operational issues.

Let’s Build the Future Together

These upcoming features are designed with you in mind, making your workflows simpler, your systems more secure, and your operations more efficient.

Stay connected for updates, and let us know how we can help you succeed.


Free trial message
Free trial
Search for vulnerabilities in your apps for free with Fluid Attacks' automated security testing! Start your 21-day free trial and discover the benefits of the Continuous Hacking Essential plan. If you prefer the Advanced plan, which includes the expertise of Fluid Attacks' hacking team, fill out this contact form.