Manage vulnerabilities
Correlate your threat model to vulnerabilities
The Design Map section provides you with a correlation between your threat model and the vulnerabilities Fluid Attacks has detected in your system. These threat matches are shown to you irrespective of whether such vulnerabilities have a 'Vulnerable' ...
Analyze your supply chain security
Role required: User, Vulnerability Manager or Group Manager The Packages section within Inventory is designed to give you visibility into the dependencies used across all active repositories in a group, helping you monitor the status of these ...
See where vulnerabilities are and more details
See a vulnerability summary The Vulnerabilities section is the first one you see when accessing a group. It presents you first with a summary of what has been detected in the group in terms of the quantity of vulnerabilities and the risk exposure ...
Examine the evidence of exploitability
The Evidence section on Fluid Attacks' platform provides supporting proof of the existence of a type of vulnerability in your software and, if applicable, is where the team of pentesters shares how they exploit the security issue in question. To view ...
Request a vulnerability be dismissed as Zero Risk
We are currently migrating our documentation. You can find this article on our new site: https://docs.fluidattacks.com/find-fix/use-platform/manage-vulnerabilities/false-positive-requests
See vulnerabilities assigned to you
The platform's To do section is where you keep track of all vulnerabilities whose remediation has been assigned to you. To access this section, simply click the To do button located in the header. To learn how to assign fix work to yourself, read the ...
Assign treatments
A treatment represents the organizational decision that you make concerning your approach to a vulnerability. This page presents a guide on how to apply treatments to reported vulnerabilities on Fluid Attacks' platform. Define a treatment for a ...
Verify fixes with reattacks
We are currently migrating our documentation. You can find this article on our new site: https://docs.fluidattacks.com/find-fix/use-platform/manage-vulnerabilities/verify-fixes-with-reattacks