Learn some basics
Continuous Hacking PoV
Fluid Attacks goes beyond a PoC (Proof of Concept) to provide potential customers with a PoV (Proof of Value). A PoC demonstrates that a solution works, but a PoV additionally helps determine if that solution is right for your company. The PoV ...
CVSSF metric
Some organizations may believe that having few security vulnerabilities is a reason for peace of mind. However, rather than focusing on the number of security issues, we should consider the risk exposure they represent. Teams should recognize that, ...
Billing for the Advanced plan
The billing model for the Advanced plan is based on the number of groups and the authors' monthly activity, specifically focusing on changes made to the source code within the platform's registered repositories. The billing begins on the first ...
Main website
On Fluid Attacks' main website, you find descriptions of our application security solutions, security advisories by the research team, blog posts and other informational resources, certifications earned by the hacking team, and much more. Supported ...
Platform demo
You can request a demo by submitting the form Talk to our experts. Read Watch certifiable tutorial videos or get a demo if you are already signed up and would like to request a walkthrough of the platform. Free trial Search for vulnerabilities in ...
Continuous Hacking free trial, plans and pricing
Fluid Attacks is the AppSec company that provides Continuous Hacking, an all-in-one solution to accurately find and help you remediate vulnerabilities throughout the SDLC and ensure secure deployments. Continuous Hacking plans Fluid Attacks' ...
Tutorial videos
Fluid Attacks' products are constantly evolving. The tutorials might show outdated visuals and miss new interesting features. For up-to-date information, always refer to this Knowledge Base. Fluid Attacks offers a one-hour course with tutorial videos ...
Glossary
B Black box The black box is a service where the hacker does not have access to source code or information on the project's infrastructure, having only access to IPs and URLs associated with environments where the project is deployed. C CI/CD ...