Manage environments

Last updated: Mar 25, 2026


Fluid Attacks evaluates environments that you have appropriately matched with source code repositories. Security testing of environments is done through dynamic application security testing (DAST) and, exclusively in the Advanced plan, penetration testing as a service (PTaaS) and software reverse engineering.

You are encouraged to have Fluid Attacks test two environments for every repository you add, provided that one of them is the production environment (read the benefits below).

Know your environments table

The table listing the environments under evaluation is found in your group's Scope section. Its columns show the following information:

  • URL: The URL address of the environment
  • Type: Whether the environment is for a mobile app or at a URL
  • Status: The inclusion or exclusion of the environment in the security testing scope; its value can be one of the following:
    • Included: The environment is included for security testing
    • Excluded: The environment is excluded from security testing
    • Open event: A situation prevents the inclusion of the environment for security testing (an icon is provided linking to the event report on the platform)
  • Secrets: Indicates the number of secrets (credentials) that you or other members have registered to access the environment
  • Connection type: The custom connection through which Fluid Attacks must access the environment; its value can be one of the following:
    • Connector: The environment is behind a private network; a Cloudflare tunnel is configured
    • Egress: The environment is behind a private network; Fluid Attacks' egress IP addresses are whitelisted
    • Legacy: Access to the environment is through a VPN
    • N/A: No custom connection
  • Deployment Stage: Whether the environment is a production or pre-production environment
  • Requires authentication: Whether or not Fluid Attacks needs credentials to access the environment
See environments tested by Fluid Attacks on the platform

Clicking the downward-facing arrow reveals more information about the environment. Namely, the date it was added, the email address of the group member who added it, and the Git repo(s) to which it is associated.

Know environment details on the Fluid Attacks platform

Add environments

You can add two environments per Git repository to be tested, as long as one of the two corresponds to a production environment. Here is why adding the latter, with no additional cost, is recommended:

  • It includes comprehensive security testing in the production stage.
  • In the absence of environment parity, testing the production environment means targeting the system's behavior that is not present in pre-production environments and is what attackers would likely interact with.
  • Production environments are more stable and less prone to unexpected issues than pre-production ones, which facilitates continuous testing.

For more information, read the FAQ.

To add environments to the security testing scope, follow these steps:

  1. Access the group's Scope section and click the URL of the active Git repository whose environment you wish to add.

    Choose repository to add environment on the Fluid Attacks platform
  2. In the pop-up window, choose the Environments tab.

    View linked environments on the Fluid Attacks platform
  3. Click on Add environment.

  4. Select the environment type and provide the required information in each case.

    Add environment to test on the Fluid Attacks platform

    Here is a short definition of each of the options:

    • Mobile app: The environment to test corresponds to a mobile application. This type requires you to choose the previously added mobile app file.
    • URL (microservice, API or web app): The environment to test is at a URL where the application is deployed. This type requires you to provide the URL.
  5. For URL environments, if access is behind a private network, check the condition accordingly. If it is not, leave the Connector and Egress options unchecked.

  6. Specify whether or not the environment is a production environment and, if applicable, whether it requires authentication.

  7. Click on Confirm to add the environment.

When checking an environment, an HTTP response code 200 usually means that the request was processed correctly. If this code is not received, there may be several reasons why the environment could have problems, which include

  • authentication or authorization errors;
  • data validation errors;
  • connection or infrastructure problems;
  • internal server errors.

Manage environment secrets

On the platform, you can securely manage secrets (credentials) that grant Fluid Attacks access to environments in order to test them. Follow these steps to add secrets:

  1. Access the group's Scope section and click the environment's URL.

  2. Click the Add secret button.

    Add environment secret on the Fluid Attacks platform
  3. Add as Key the kind of secret it is (e.g., token) and as Value the actual secret. Optionally, provide a description that can help its use.

    Manage environment secrets on the Fluid Attacks platform
  4. Click on Confirm.

The environment secret is added to the table and made available for Fluid Attacks to view. You can view, edit or remove only the secrets you added.

View, edit, or remove secrets on the Fluid Attacks platform

Edit environments

You may edit the information on connection type and whether the environment is a production environment. These are the steps:

  1. Access the group's Scope section and click the URL of the active Git repository whose environment you wish to edit.

  2. Switch to the Environments tab.

  3. From the Actions column, click on the edit icon.

    Edit environment on the Fluid Attacks platform
  4. Make the desired changes and click on Confirm.

    Edit production environment on the Fluid Attacks platform

Remove environments

In order to remove an environment, follow these steps:

  1. Click on the Git repository to which the environment is linked.

  2. Switch to the Environments tab.

  3. From the Actions column, click the trash can icon corresponding to the environment you wish to delete.

    Remove environment on the Fluid Attacks platform
  4. Confirm removal.

    Confirm environment removal on the Fluid Attacks platform

Move environments

You can move environments across Git repositories within the same group or in a different one. These are the steps:

  1. Access the group's Scope section and click the URL of the active Git repository whose environment you wish to move.

  2. Switch to the Environments tab.

  3. From the Actions column, click on the move icon.

    Move environment on the Fluid Attacks platform
  4. Select the target group.

    Move environment to a group on the Fluid Attacks platform
  5. Type in the search box either part of the target repo's URL, branch or nickname, to activate the dropdown menu from which you can choose the repo.

    Change environment root on the Fluid Attacks platform
  6. Click Confirm.

Exclude environments

If you want to exclude from security testing a subpath of a specific environment, follow the steps below:

  1. Go to your group's Scope section.

  2. Add the subpath you wish to exclude as you would add an environment to test. To learn how to do the latter, read the "Add environments" section.

    Add environment to exclude on the Fluid Attacks platform
  3. Click Confirm.

  4. In the table, locate the added subpath and switch the corresponding toggle in the Exclusion status column to off.

    Exclude environment from tests on the Fluid Attacks platform
  5. Click on Confirm to apply the exclusion.

    Confirm environment exclusion on the Fluid Attacks platform

Manage mobile apps

Add mobile apps to test

To add mobile apps for testing (e.g., .aab, .ipa, .apk), you can refer to the mobile app distribution platform where it is located or upload the app file directly. Choosing the latter, you can either upload the file in the Add environment window or upload it in Files and then add an environment linking to that file.

Here are the steps to upload your mobile app, starting from the Add environment window:

  1. Access the group's Scope section and click on the URL of the repository related to the mobile app. If you have not yet added the repository, do so by following the steps in "Add a new Git repository".

  2. Switch to the Environments tab and click on Add environment.

  3. Choose "Mobile App" as the environment type.

  4. Choose a mobile app distribution platform or indicate that you will upload the file directly. The supported platforms are TestFlight, Firebase, App Store Connect, and Google Play Store.

    Choose mobile app platform on the Fluid Attacks platform

    When choosing distribution platforms, you need to indicate your app's name. And if you choose Firebase, you are also asked to specify the OS for which the app is made (Android or iOS).

    Choose app operating system on the Fluid Attacks platform

    You are required to grant access to continuous@fluidattacks.org, squad@fluidattacks.com, and continuousatfluidattacks@gmail.com, depending on the chosen distribution platform. Click on the toggle to confirm this step.

    Confirm emails granted access on the Fluid Attacks platform

    If you are uploading the mobile app file directly, you can select a preuploaded file (steps further below) or upload the file. Its size must not exceed 4.88 GB.

    Upload a mobile app on the Fluid Attacks platform

    Additionally, for Fluid Attacks to perform security testing in your environment, you must upload two versions of the application at different times: one with and another without RASP controls (e.g., root detection, emulator detection, SSL pinning). Select the option that corresponds to the file in question.

    Select whether the file version includes RASP controls on the Fluid Attacks platform
  5. Lastly, specify if it is a production environment.

    Specify production environment on the Fluid Attacks platform
  6. Click on Confirm.

As an alternative, add the mobile app in Files and then link it to an environment:

  1. Access the group's Scope section and scroll down to Files.

    View files section on the Fluid Attacks platform
  2. Click on Add.

  3. Click on the Add file button and choose the mobile app file. Remember, its size must not exceed 4.88 GB.

    Add mobile app file on the Fluid Attacks platform
  4. Click on Confirm. Your file should now be visible in the table.

  5. Scroll up to Git Repositories. If you have not yet added the repository related to the mobile app in question, do so by following the steps in "Add a new Git repository".

  6. Click on the repository URL and choose Environments > Add environment.

  7. Choose Mobile App as the environment type, then select the corresponding file from Select a binary file, and specify if it includes RASP controls and if it is a production environment.

    Add mobile app environment on the Fluid Attacks platform
  8. Click on Confirm.

Update mobile app file

If you have added your mobile app through TestFlight, Firebase, App Store Connect, or Google Play Store, Fluid Attacks can always get the latest version of your app on those platforms. Otherwise, follow these steps to add a newer version of your mobile app.

Do not delete the file, as this causes the platform to mark any "Open" vulnerabilities found in the app as "Closed" (this is undesirable, as you want us to continue testing the app).

  1. Go to Scope > Files.

  2. Click on the mobile app file.

  3. Click on Add file and upload the newer app version.

    Update mobile app file on the Fluid Attacks platform
  4. Click on Replace file.

  5. Read the warning message. You acknowledge that the file is linked to an environment, vulnerabilities found in the older file can refer to the newer file, and the latter corresponds to the same mobile app. If you wish to proceed, click on Confirm.

    Confirm file update on the Fluid Attacks platform

Remove mobile app file

If you are removing a file associated with an environment, you get the following message after step 3 below.

View file removal message on the Fluid Attacks platform

In this case, follow the steps described in "Remove environments" instead. This should be done by a Group Manager. As the message says, removing the environment also removes the mobile app file.

If the file is not associated with an environment, do the following:

  1. Go to Scope > Files.

  2. Click on the file to be removed.

  3. Click on Remove.

  4. Click on Confirm.

    Confirm file deletion on the Fluid Attacks platform

On this page