Examine evidence
Last updated: Mar 26, 2026
Role required: User, Vulnerability Manager or Group Manager
The Evidence section on Fluid Attacks' platform provides supporting proof of the existence of a type of vulnerability in your software and, if applicable, is where the team of pentesters shares how they exploit the security issue in question. To view evidence, follow these steps:
-
Enter the group where the type of vulnerability was reported.
-
In Vulnerabilities, click on the name of the weakness.

-
Switch to the Evidence tab.

Click on a resource to enlarge it, and then you can download it.
Evidence is presented in the form of pictures (with the .png and .jpg extensions) and videos (with the .webm extension), to convince you of the vulnerability's presence in your system and, if applicable, actual threat to information in it.
These are important points to consider regarding evidence:
- The evidence presented may change whenever a reattack is performed to check the presence of the weakness in question after a fix is implemented.
- The number of evidence items is limited to seven.
- The items presented can be updated following your request in the Comments section.
Search for vulnerabilities in your apps for free with Fluid Attacks' automated security testing! Start your 21-day free trial and discover the benefits of the Continuous Hacking Essential plan. If you prefer the Advanced plan, which includes the expertise of Fluid Attacks' hacking team, fill out this contact form.
See where vulnerabilities are and more details
See information about reported vulnerabilities, like description, severity, vulnerable code, treatments, and fix recommendations on the Fluid Attacks platform.
Supply chain analysis
The Fluid Attacks platform allows you to track the security of software dependencies in your app, learn the reachability analysis results and download SBOMs.