Compliance
This section consists of security standards, regulations and requirements that are known, used and implemented internationally in different types of organizations.
Requirements
This section allows you to determine what is tested and what is not, and find out what is considered a vulnerability. The security requirements are independent of the type of technology being used and are written as specific and understandable object
Vulnerabilities
This standardization of the set of vulnerabilities serves as a basis for Fluid Attacks' security testing. This effort is ever-evolving, as new types arise every day.
Fixes
Welcome to the "Fixes" section, your go-to resource for comprehensive remediation guidance to address source code vulnerabilities across various programming languages. This section serves as a compass, offering tailored solutions and practices to for