See vulnerabilities assigned to you | Fluid Attacks Help

See vulnerabilities assigned to you

The platform's To do section is where you keep track of all vulnerabilities whose remediation has been assigned to you as well as the types that have the highest priority scores across all the groups you are a part of, therefore benefitting vulnerability management. To access this section, simply click the To do button located in the header.

Find pending tasks on the Fluid Attacks platform

To learn how to assign fix work to yourself, read the corresponding information in Assign treatments.

Note on vulnerability assignmentNote: Members with the User Manager or Vulnerability Manager role can assign vulnerabilities to any member of the group.

Know your Assigned locations table

Role requirement info
Role required: User, Vulnerability Manager or User Manager
The table in the To do section provides a comprehensive overview of the vulnerabilities you are responsible for addressing.

View pending tasks on the Fluid Attacks platform

This is the information provided in the table:
  • Organization: The organization where the vulnerability was identified
  • Group name: The group where the vulnerability is present (click on the group name to go to the Vulnerabilities section of that group)
  • Type: The type of vulnerability in question (click on it to go to its dedicated section within the group)
  • Vulnerability: The vulnerability's location
  • Evidence: The link to the Evidence section of the type of vulnerability
  • Last reattack: The status of the most recent reattack request for this vulnerability
  • Severity: The severity level of the vulnerability, based on the Common Vulnerability Scoring System (CVSS)
  • Tags: Any tags associated with the vulnerability during assignment

View the top ten vulnerabilities to prioritize

Role requirement info
Role required: User, Vulnerability Manager or User Manager
To do has a Priority fixes section that shows you the ten most important types of vulnerabilities to remediate across all the groups of which you are a member. This top ten is constructed according to the total Priority score of these security issues. This score takes into account (a) the root Priority, (b) prioritization policies, (c) Priority units assigned to individual vulnerabilities, and (d) a default score calculated with the formula (4^(CVSS-4)) / 4.096.

See top ten vulnerabilities to remediate on the Fluid Attacks platform
Advice on top ten vulnerabilities
The Location column shows the selected individual vulnerability with the highest Priority score within the type of vulnerability. Click on it to see inside the vulnerability.

Edit vulnerabilities in your to-do list

Role requirement info
Role required: User, Vulnerability Manager or User Manager
Note on User roleMembers with the User role can assign fix work to themselves and edit the External BTS, Tags and Priority values.
To edit a vulnerability in the to-do list, follow these steps:
  1. Go to the To do section.

  2. In the table, select the checkbox on the left of the vulnerability in question.
  3. Select vulnerability to edit on the Fluid Attacks platform

  4. Click the Edit button.
  5. Find option to edit vulnerability on the Fluid Attacks platform

  6. Make the necessary changes in the form. Only Vulnerability Managers and User Managers can modify the values of Treatment and Assigned. (For descriptions of the fields, read Assign treatments.)
  7. Edit vulnerability on the Fluid Attacks platform

  8. Click on Confirm to apply the changes.

Any changes made trigger notifications to members subscribed to them.

Request a reattack

Role requirement info
Role required: User, Vulnerability Manager or User Manager

After fixing your code to remediate a vulnerability, you can request a reattack to verify the effectiveness of your fix. You can ask for reattacks from the Locations and To do sections.

Here are the steps to perform a reattack from the To do section:

  1. In the To do section, select the vulnerability that you addressed.

  2. Click the Reattack button.
  3. Reattack from the To do list on the Fluid Attacks platform

  4. In the pop-up window, provide a justification for the reattack request (minimum 10 characters).
  5. Provide reattack justification on the Fluid Attacks platform

  6. Click on Confirm to send the request.

Filter the Assigned locations table

Role requirement info
Role required: User, Vulnerability Manager or User Manager

Filtering allows you to quickly refine the displayed vulnerabilities based on specific criteria. To access the options, click on Filters.

Filter the To do table on the Fluid Attacks platform

To clear an applied filter, simply click on the X next to it.

Clear filter in the to-do list on the Fluid Attacks platform

Refresh the Assigned locations table

Role requirement info
Role required: User, Vulnerability Manager or User Manager

To update the displayed vulnerabilities and reflect any recent changes, therefore having your pending tasks list up to date, click the Update table button.Update the to do table on the Fluid Attacks platform

Search the Assigned locations table

Role requirement info
Role required: User, Vulnerability Manager or User Manager

The search bar filters the information by showing only the rows of the table that match your search.
Search the to do list on the Fluid Attacks platform

Use the Cancel button

Role requirement info
Role required: User, Vulnerability Manager or User Manager

If you interrupted the process of requesting a reattack, the Cancel button becomes available, replacing the edit option while you remain in the To do section. Simply click it to reveal the Edit button again.
Use the cancel button in To do on the Fluid Attacks platform
Free trial message
Free trial
Search for vulnerabilities in your apps for free with Fluid Attacks' automated security testing! Start your 21-day free trial and discover the benefits of the Continuous Hacking Essential plan. If you prefer the Advanced plan, which includes the expertise of Fluid Attacks' hacking team, fill out this contact form.