Product roadmap | Fluid Attacks Help

Product roadmap

See where we are going together
We’re excited to share our priorities and upcoming features, designed to enhance security, simplify workflows, and empower you with greater efficiency and transparency.

Priority

Vulnerabilities view

Manage all vulnerabilities—both inherited and injected—through a unified tab, simplifying workflows and reducing the need to switch between multiple tools.

Inherited vulnerabilities treatment

Evaluate the risk of all inherited vulnerabilities to ensure thorough coverage and reduce security gaps in the Software Development Life Cycle (SDLC). 

Supply chain

Support for package manager extensions

Integrate with various package managers to simplify dependency management and streamline workflows.

Languages and extensions
.NET
  1. .csproj SUPPORTED
  2. .exe.config COMING SOON
  3. packages.config SUPPORTED

C++
  1. conan.lock SUPPORTED
  2. conanfile.py COMING SOON
  3. conanfile.txt COMING SOON

Dart
  1. pubspec.yaml COMING SOON

Elixir
  1. mix.exs COMING SOON
  2. mix.lock SUPPORTED

Go
  1. go.mod COMING SOON

HTML
  1. .html (script tags) SUPPORTED

Java
  1. .gradle SUPPORTED
  2. build.gradle.kts SUPPORTED
  3. .xml (Maven pom.xml) SUPPORTED
  4. gradle-wrapper.properties COMING SOON
  5. build.sbt COMING SOON

JavaScript
  1. package-lock.json SUPPORTED
  2. package.json SUPPORTED
  3. pnpm-lock.yaml SUPPORTED
  4. yarn.lock SUPPORTED

PHP
  1. composer.json SUPPORTED
  2. composer.lock SUPPORTED

Python
  1. .txt (pip requirements) SUPPORTED
  2. Pipfile SUPPORTED
  3. Pipfile.lock SUPPORTED
  4. pyproject.toml SUPPORTED

Ruby
  1. Gemfile SUPPORTED
  2. Gemfile.lock SUPPORTED
  3. gems.locked SUPPORTED

Rust
  1. Cargo.lock SUPPORTED
  2. Cargo.toml SUPPORTED

Swift
  1. Package.resolved SUPPORTED

SBOM (software bill of materials)
  1. .json (SPDX/CycloneDX) COMING SOON
  2. .xml (SPDX/CycloneDX) COMING SOON

Report on malware dependencies

Generate reports that identify malicious dependencies used in the project for timely risk mitigation.

SBOM for Docker images

Generate a Software Bill of Materials (SBOM) for Docker images, detailing dependencies and operating system components to improve visibility and traceability.

Report on development dependencies

List all development dependencies, including those outside of production code, to identify potential vulnerabilities (CVEs) and secure the environment.

Differentiate between direct and transitive dependencies

Distinguish between direct and transitive dependencies in the dependency tree to improve visibility and prioritize security fixes.


Scope management

Environments URL

Relocate environments and associated resources between roots and groups with a single action to support evolving operational needs.

To-do

Default columns

Expand default views to include additional columns, providing a more comprehensive overview in the interface.


Platform usability

Columns, filters and tables

Provide the interface with improved navigation, responsiveness, and performance to enhance usability and reduce complexity.

Audit and compliance

Audit logging

Implement detailed logging of user actions, configuration changes, and system events to support compliance and incident investigation.


Free trial message
Free trial
Search for vulnerabilities in your apps for free with Fluid Attacks' automated security testing! Start your 21-day free trial and discover the benefits of the Continuous Hacking Essential plan. If you prefer the Advanced plan, which includes the expertise of Fluid Attacks' hacking team, fill out this contact form.