You can see details of each of CI Gate's executions in the DevSecOps section. This page guides you through it.
Your group's DevSecOps section features a comprehensive table that shows the execution history of CI Gate within your pipeline. A banner reminds you of your relevant policies currently applied in executions. Gain deeper insights into each execution by simply clicking on the corresponding date.

Role required: User, Vulnerability Manager or Group Manager

Role required: User, Vulnerability Manager or Group ManagerType on the search bar for the table to show you only the rows that contain your exact search term.

Role required: User, Vulnerability Manager or Group ManagerThe platform allows you to download the information contained by the DevSecOps table in a comma-separated values (CSV) file. You just need to click on the Generate a report button. The report is made available in Downloads after a few minutes.
Generate report button
Role required: User, Vulnerability Manager or Group ManagerIn the DevSecOps section, to gain more details about a specific CI Gate execution, click on its date.


Here are brief definitions of these policies:
Below these details is a table with information about all vulnerabilities identified by CI Gate in its execution.

The table has the following columns:
You can apply filters to narrow down the information displayed in the table, facilitating targeted analysis.


--output CLI option and outputting the report to a file, or by querying the jsonLog attribute of forcesExecution in the platform's API.Understanding CI Gate's execution log content can sometimes be challenging. This page section offers valuable tips and key information to help you interpret it effectively and extract maximum value from the data. The following are main elements to take into account:
--strict.
title: The category that best describes the vulnerability following Fluid Attacks' own classificationurl: The vulnerability URL on the platformstate: Indicates the condition of the group regarding the type of vulnerability, where it is Vulnerable if the weakness is presentexploit: From the CVSS, probability of exploitation given the current state of techniques for it, exploit code availability, and actual exploitation "in the wild"severity: The type of vulnerability's severity score (from 0.1 to 10.0) using the CVSSvulnerable: The total number of unfixed vulnerabilitieslocations: The vulnerabilities that were identified, for which the following is informed:type: Whether it is a vulnerability found by looking at the source code (static) or attacking the running application (dynamic)technique: The security testing technique with which the vulnerability was detectedwhere: The file path where this vulnerability was foundspecific: The indication of the exact lines of code, inputs (e.g., password fields) or ports where the vulnerability was foundstate: Indicates that the lines of code, inputs or ports are Vulnerable (the vulnerability is present)severity: This specific vulnerability's severity score using the CVSScompliance: Whether the vulnerability breaks the build

Free trial