False negatives

Last updated: May 15, 2026


Definition

A false negative (FN) is an erroneous report indicating that a vulnerability does not exist or is absent.

Specifically, Fluid Attacks considers false negatives as instances when it fails to report a vulnerability that was within the scope of its tests, and all the necessary inputs to reproduce this vulnerability were available.

False negatives are a serious problem in software development projects, as overlooked issues may be involved in leaks or successful cyberattacks.

False negative requests

In the Advanced plan

Fluid Attacks' Continuous Hacking offers very low rates of false negatives, as it tests systems comprehensively with multiple techniques.

Accordingly, it includes high accuracy levels in its service-level agreement (SLA). However, in the course of Continuous Hacking Advanced, your organization or another application security provider might find a vulnerability that Fluid Attacks did not flag in a software that it had already assessed (i.e., a potential false negative). For the Accuracy SLA to apply, your false negative request must satisfy several criteria (see criteria in item 5 below).

To ensure a thorough investigation and swift resolution of any false negatives (FNs) in your Advanced plan, both parties shall adhere to the following protocol:

  1. Submit the FN request to your Fluid Attacks Engagement Manager or Sales Representative through any of the communication channels you typically use for your interactions.

  2. Fluid Attacks shall assess the level of urgency of your request, that is, whether or not active exploitation of the vulnerability is identified. If so, Fluid Attacks shall prioritize helping you contain the incident.

  3. The Engagement Manager shall give you the "False Negative Request" form.

  4. Fill out the form and send it to Fluid Attacks. If another application security provider reported the FN, please send Fluid Attacks the full report from that provider. If the report is not available as a single file, provide the complete set of results or findings shared by that provider. (Ideally, you should upload the report to the platform in the file set for the group that includes the affected software in its scope.)

  5. Fluid Attacks shall investigate the FN request as follows:

    • Fluid Attacks assigns a security analyst to thoroughly investigate the report.
    • The analyst attempts to reproduce the vulnerability in a controlled environment. If reproducible, the analyst attempts to map the vulnerability to the codebase and determines if the vulnerability constitutes a false negative based on the following criteria:
      • It is not a false negative if

        • Fluid Attacks was not in possession of both the source code and the corresponding environment;

        • the environment was not paired with the provided branch;

        • the environment was not stable for at least 80% of business days due to unsolved events;

        • the data required for continuous testing flows (e.g., credentials, input fields) was incomplete or unusable;

        • remote access without human intervention (e.g., CAPTCHA, OTP) was not enabled;

        • the vulnerability predates the addition of the repository to Fluid Attacks' testing, and no Health Check was performed, or the post-Health Check review period had not yet been completed;

        • the vulnerability's status changed from "Open" to "Closed" due to exclusions, deactivations, or removals;

        • the average monthly insertions per author exceed 8,000, calculated over a rolling two-year window counting backward from the date of the FN request;

        • the potential vulnerability was reported within the tolerable window of 90 calendar days after its date of injection via a commit to the branch registered for tests in the platform (for vulnerabilities associated with SCA, the vulnerability will be considered a false negative only if at least 48 hours have elapsed since the CVE was published in any of the sources consulted by Fluid Attacks, as defined in "Vulnerability signature update");

        • the vulnerability was found in an unsupported technology;

        • the vulnerability was found in an application that the client does not own or is not authorized to submit for testing.

      • It is a false negative if —without any of the above conditions being met—Fluid Attacks had access to the code and environment and the vulnerability was present during the testing period, but Fluid Attacks did not identify it.

  6. Fluid Attacks communicates the investigation results via video call.

In the Essential plan

Organizations subscribed to the Essential plan may also share reports from other application security companies when those providers identify vulnerabilities that Fluid Attacks did not report.

For this review, your team and Fluid Attacks shall adhere to the following protocol:

  1. Submit the FN request to your Fluid Attacks Engagement Manager or Sales Representative through any of the communication channels you typically use for your interactions.
  2. Fluid Attacks shall assess the level of urgency of your request, that is, whether or not active exploitation of the vulnerability is identified. If so, Fluid Attacks shall prioritize helping you contain the incident.
  3. The Engagement Manager shall give you the "False Negative Request" form.
  4. Fill out the form and send it to Fluid Attacks. If another application security provider reported the FN, please send Fluid Attacks the full report from that provider. If the report is not available as a single file, provide the complete set of results or findings shared by that provider. (Ideally, you should upload the report to the platform in the file set for the group that includes the affected software in its scope.)
  5. Fluid Attacks assigns a security analyst to thoroughly investigate the report.
  6. The analyst attempts to reproduce the vulnerability in a controlled environment. If reproducible, the analyst attempts to map the vulnerability to the codebase and determines whether it constitutes a false negative.
  7. Fluid Attacks communicates the investigation results via video call.

These requests are not processed under the Accuracy SLA, which applies only to the Advanced plan. In the Essential plan, Fluid Attacks reviews this information to compare detection results and effectiveness based on beta scores, validate whether the reported vulnerabilities are reproducible, and determine whether its automated testing scanners and rules can be improved to detect similar vulnerabilities.

On this page