Skip to main content

Introduction

Who we are#

We are a cyber-security company whose only purpose is to make the world a safer place.

What we do#

  • We perform comprehensive security testing over all of your assets.
  • We use cutting edge technologies and heavily trained human hackers.
  • We report vulnerabilities back to you as accurate and fast as possible.

The source code of the technologies used is versioned in this repository and is divided across many products:

ProductBadges
LicenseLicense
QualityQuality Gate Security RatingMaintainability RatingTechnical DebtCode Grade
Contributing

Installing#

Most products are distributed as a standalone binary.

Before proceeding make sure you have Nix installed in your system, otherwise please install it as explained in the tutorial.

You can install the products of your choice by using one or many of the following commands:

  • bash <(curl -L fluidattacks.com/install/asserts)
  • bash <(curl -L fluidattacks.com/install/forces)
  • bash <(curl -L fluidattacks.com/install/melts)
  • bash <(curl -L fluidattacks.com/install/reviews)
  • bash <(curl -L fluidattacks.com/install/skims)
  • bash <(curl -L fluidattacks.com/install/sorts)

Once installed, you can test that they work by invoking the product like skims --help, forces --help, and so on.

You can see installed software with: nix-env -q and uninstall with: nix-env -e.