Groups section

Last updated: Apr 10, 2026


Groups correspond to independent management units created by you within your organization on the Fluid Attacks platform, consisting of one or more repositories and environments of the evaluated system, from which vulnerabilities are reported. Therefore, you may have several groups, and this is the recommended action, implying independent access, reports, tracking of vulnerability management, and policies (read the details in our FAQ).

When you create a group, Fluid Attacks' multi-method vulnerability scanner starts assessing the system associated with it in search of vulnerabilities. Moreover, if you are subscribed to the Advanced plan, Fluid Attacks' team of pentesters also assesses your system.

The platform has a Groups section, which is described in detail below.

Find Groups section on the Fluid Attacks platform

Attack surface

In the upper part of Groups, you can see how much of your attack surface is covered by Fluid Attacks' tests. Here is a description of the information:

  • [#]% coverage: The percentage of your repositories retrieved by Fluid Attacks through OAuth which are already in a group and therefore within scope of security tests
  • [#] total repositories: The number of your repositories retrieved
  • [#] covered: The number of your repositories retrieved and already in a group
  • [#] out of scope: The number of your repositories retrieved which need to be assigned a group (click on the link to manage this in the Out of scope section)

Vulnerability summary

Also in the upper part of Groups, you can see a high-level summary of vulnerability findings across the groups in your organization. This is the information shown:

  • The number of currently open vulnerabilities
  • The number of currently open weaknesses (each weakness is counted as many times as it appears across your groups)
  • The total CVSSF units corresponding to open vulnerabilities
  • The number of detected vulnerabilities of each CVSS qualitative severity rating

Group table

In the group table, you find the names of all the groups you have access to within your organization, along with details about the groups and your role in them. This table has seven columns. You can organize their contents alphabetically or numerically (either in ascending or descending order) by clicking on the arrows next to each column name.

You can filter the table by group name or subscription plan, and you can use the search box to display only the rows that have the content you type in it.

View the group table on the Fluid Attacks platform

The groups table provides you with the following information:

  • Group name: The name your organization has given to the group
  • Plan: Either the plan to which the group is subscribed or the indication that the group is assessed under a free trial; accordingly, this column may display one of the following values:
    • Essential: Secures your application through completely automated security testing and assistance in vulnerability remediation
    • Advanced: Leverages the Essential plan features, the manual security testing, and the support in understanding vulnerabilities from a team of pentesters
    • Free trial: Secures your application through all the Essential plan features for 21 days
  • Vulnerabilities: Either the total number of open vulnerabilities detected in the system(s) associated with the group or the status of the assets provided for the group; accordingly, this column may display one of the following values:
    • Add repository: The group exists, but a repository to assess has not been added
    • Cloning: A repository is being cloned for security testing
    • Cloning error: There is an error in the cloning process of all the group's roots
    • Testing: A successfully cloned root is being tested
    • No vulnerabilities: No vulnerabilities have been found in the system(s) associated with the group
    • [#] open: The total number of vulnerabilities detected in the group that have not been remediated
  • Target description: A short description of the group given at its creation
  • Target evaluation stage: The kind of environment that will be evaluated, which can be one of the following:
    • Development
    • QA
    • Pre-production
    • Production
    • Other (custom environment type)
  • Role: Your role within the group, which can be one of the following:
    • User: Role for those responsible for understanding and remediating vulnerabilities detected in your software projects
    • Vulnerability Manager: Role for those responsible for reviewing the requests of developers (generally with the User role) and tracking progress in remediation
    • Group Manager: Role for those responsible for granting access and roles, managing the target of evaluation and policies, and tracking progress in remediation
  • Events: The number of unsolved events in the group (i.e., situations that prevent the assessment of part, or the entire, target of evaluation)

You can access sections dedicated to a group by clicking on its name. Your access to the group sections and usage of their available functionalities depend on your role on the platform. You can read a short description of each group-level section on the page "Platform interface and sections".

Create a new group

To start creating a new group, you need to click on the New group button in the Groups section. Read the page "Create and delete groups" for a detailed description of the steps.

Use the option to create a new group on the Fluid Attacks platform

Filter group table data

Filters allow you to limit the data you visualize, facilitating your search. The Group section has a filter button (Filter Icon) which, upon click, allows you to filter the group table by Events, Plan, Role, Target evaluation stage, and Target type.

Filter group table on the Fluid Attacks platform
Find filters in Groups
Filter groups on the Fluid Attacks platform
Apply filter

Any filter applied is shown above the table. And a number next to the filter button indicates the number of applied filters. You can easily clear a filter by clicking on the X next to it.

Clear filters in group table on the Fluid Attacks platform

Search the group table

By typing in the search bar in the Groups section, you filter the group table so that the only rows that are shown are those containing the content you type.

See events impeding tests in groups

As mentioned above, in the group table, you find a column called Events. These are situations that need your prompt attention to resume the expected course of security testing. In this column, you can discover how many unsolved events need your attention in each of your groups. If you click on this column's contents, you are directed to the Events section of the corresponding group.

Whenever you enter the Groups section and there are unsolved events in one or more groups, a banner appears for a short amount of time. The banner informs of the number of groups that have unsolved events, how many of the latter there are in total, and the number of days since the oldest of those events was reported. By hovering over it, a tooltip appears which tells you the name(s) of the group(s) in question.

View unsolved events banner on the Fluid Attacks platform

To learn about the types of events and managing them, read the page "Resolve Events impeding tests".

Switch between groups

Once inside a group, to quickly switch to a different group, click on the arrows next to the group's name and choose the group you want to enter from the list.

Find option to switch groups on the Fluid Attacks platform
Click to access group list
Switch between groups on the Fluid Attacks platform
Select a group to enter

On this page