0 filters active
Skip to Content
logo
  • Home
  • Quick start
      • Billing
      • Integrations
      • Platform
      • Scanner
      • Ask our pentesters to explain a vulnerability
      • Fix code with gen AI from the IDE
      • See safe dependency versions
      • Import repositories to test
      • Invite team members to sign up
      • Billing for the Advanced plan
      • Continuous Hacking free trial, plans and pricing
      • Continuous Hacking methodology
      • Continuous Hacking PoV
      • CVSSF metric
      • Glossary
      • Main website
      • Platform demo
      • Tutorial videos
      • What is DAST?
      • What is SAST?
      • Assign vulnerability remediation to a team member
      • See details of the reported security vulnerabilities
    • Sign up to Fluid Attacks
      • Break the build
      • Install CI Gate to break the build
      • Verify whether a fix was successful
  • Find and fix
    • Access to your assets
      • Cloud
      • Connector
      • Egress
      • Set up an AWS IAM role
      • Summary of mechanisms used to access assets
      • Types of authentication used
      • Fix code automatically with gen AI
      • Get AI-generated guides for remediation
      • Contribute to enhancing the scanners
      • Fluid Attacks' scanners
      • Know and reproduce the scanner’s OWASP Benchmark results
      • Pentesters' tools
    • Machine
      • Configure and use Sorts on your own
      • Introduction to Fluid Attacks' AI tool
      • Accuracy SLA
      • Availability SLA
      • False negatives
      • False positives
      • Response SLA
      • Scope
      • Service-level agreement summary
        • 2023
        • 2024
        • 2025
        • 2026
      • Documentation sections
      • Roadmap
      • Supported AI functions
      • Supported attack surfaces
      • Supported binaries
      • Supported browsers
      • Supported CI/CD
      • Supported clouds
      • Supported CVEs for reachability analysis
      • Supported evidence formats
      • Supported frameworks
      • Supported IDE functionalities
      • Supported languages
      • Supported languages for vulnerability fixes
      • Supported package managers
      • Supported remediation
      • Supported SCM systems
      • Supported secrets
      • Supported standards
      • Supported ticketing systems
      • CVSS score adjustment
      • Find reachable dependency vulnerabilities
      • Vulnerability signature update
      • What is SCA?
      • APK scanner configuration file
      • DAST scanner configuration file
      • SAST scanner configuration file
      • SCA scanner configuration file
      • Scan with a configuration file
    • Use the Platform
        • Platform sections and header items
        • Sign-up and login authentication
        • Create and delete groups
        • Create another organization
        • Know your Groups section
        • Manage a group's configuration
        • Register payment information
        • See the target of evaluation's status and SBOM
        • Sort groups into portfolios
        • Invite contributing developers
        • Manage members
        • Manage your organization's authors
        • Understand roles
        • Import repositories fast and safely with OAuth
        • Manage environments
        • Manage repositories
        • Manage your credentials
        • Resolve events impeding tests
        • See retrieved repositories not yet added to any group
        • Analyze your supply chain security
        • Assign treatments
        • Correlate your threat model to vulnerabilities
        • Examine the evidence of exploitability
        • Request a vulnerability be dismissed as Zero Risk
        • See vulnerabilities assigned to you
        • See where vulnerabilities are and more details
        • Verify fixes with reattacks
        • Ask the AI Agent
        • Ask via chat
        • Post comments
        • Send Fluid Attacks an email
        • Talk to a Pentester
        • Watch certifiable tutorial videos or get a demo
        • Access recent downloads
        • Check your compliance with standards
        • View analytics common to orgs, groups and portfolios
        • Download a report of detected vulnerabilities
        • View analytics for the group level only
        • View analytics for the portfolio level only
        • Use analytics charts options
        • View and download logs
        • Accept vulnerabilities
        • Manage fix prioritization policies
        • Manage security gates
        • Prevent the deployment of builds with vulnerabilities
        • View details of the security of your builds
        • Enable and disable notifications
        • Explore the user menu
        • Leave group
        • Subscribe to news
      • Manage repositories
      • See vulnerabilities
      • Exclude findings from scan reports
      • Run scans locally
      • Understand the scanner output
      • Use standalone scanners
      • Use the scanners in CI/CD
  • Integrations
      • Local tools
      • Access Talk to a Pentester and help from Jira issues
      • Automate Jira issue creation
      • Create Jira issues for vulnerabilities
      • Go to vulnerability evidence and more from Jira issues
      • Install the Fluid Attacks app for Jira Cloud
      • Link vulnerabilities to Jira issues or unlink them
      • Request reattacks from Jira issues
      • Set up the Jira integration
      • Set up the Azure DevOps integration
      • Set up the GitLab integration
      • Install the VS Code extension
      • View vulnerable lines, use fix options and more
      • VS Code extension error and solution catalog
      • Identify and address vulnerabilities from IntelliJ
      • Install the IntelliJ plugin
      • Identify and address vulnerabilities from Cursor
      • Install the Cursor extension
      • AWS Marketplace integration
    • MCP server
      • Installation
      • Capabilities and use cases
      • Docker installation
      • Excluding files from analysis
      • Integrate with Azure DevOps Peer Reviewer Assistant
      • Integrate with GitLab Peer Reviewer Assistant
      • Troubleshooting
      • Introduction
      • Use the API
      • Learn the basics of the Fluid Attacks API
      • Things to know before using the API
  • Stack
      • Bash
      • Python
      • Terraform
      • TypeScript
      • Ariadne
      • Commitlint
      • Docker
      • ESLint
      • GraphQL
      • Hypercorn
      • Kubernetes
      • Labels
      • Mypy
      • Nix Flakes
      • Platform audit logs
      • Platform authentication
      • Platform authorization
      • Pydantic AI
      • React
      • Ruff
      • Sops
      • Starlette
      • Tree-sitter
      • Visual Studio Code
      • AWS
      • Batch
      • Bedrock
      • BigCodeBench
      • BugSnag
      • Checkly
      • Claude 3.5 Sonnet
      • Cloudflare
      • CloudWatch
      • Cost Management
      • Datadog
      • dbt
      • DynamoDB
      • EBS
      • EC2
      • EKS
      • ELB
      • Engineering metrics
      • ePayco
      • EventBridge
      • GitLab
      • GitLab CI
      • Google Workspace
      • IAM
      • Jamf
      • KMS
      • Lambda
      • LogRocket
      • Okta
      • OpenAI
      • OpenSearch
      • Organizations
      • QuickSight
      • S3
      • SageMaker
      • Snowflake
      • Statuspage
      • Step Functions
      • Stripe
      • Treli
      • Ubiquiti
      • Vanta
      • Voyage AI
      • VPC
      • VPN
      • Zoho One
      • Zoho Sign
  • Compliance
      • Clients
      • Password policies
      • Staff
      • Access revocation
      • Endpoint
      • Authorization for clients
      • Authorization for Fluid Attacks staff
      • Secret rotation
      • Secure employee termination
      • Session management
      • Distributed apps
      • Distributed firewall
      • Everything backed up
      • Multiple zones
      • Recovery objective
      • Device (re)enrolling
      • Direct hiring
      • Encryption at rest
      • Encryption in transit
      • No personal gain
      • Personnel NDA
      • Secure deletion
      • Awareness
      • Certification Hub
      • Certified cloud provider
      • Certified security analysts
      • Comprehensive reporting
      • Developing for integrity
      • Extensive hiring process
      • Monitoring
      • Production data not used for dev or test
      • Secure emails
      • Software Artifacts SLSA levels
      • Static website
      • Training plan
      • Everything as code
      • Extensive logs
      • Data privacy policy
      • Data policies
      • Email obfuscation
      • Employee time tracking software
      • Manual for the National Database Registry (NDR)
      • OTR messaging
      • Polygraph tests
      • Project pseudonymization
      • Retention
      • Secure delivery of sensitive data
      • Transparent use of cookies
      • Unsubscribe email
      • Continuity and recovery
      • Equipment and telecommuting
      • Everything is decentralized
      • Redundant roles
      • Complaint management
      • Data leakage policy
      • Ethics hotline
      • Help channel
      • Incident management
      • Information security responsibility
      • Open source
      • Quality policy
      • Status page
      • Testing our technology
      • Vulnerability releasing
  • Compare
    • 42Crunch
    • 7 Way Security
    • Aikido
    • Anvil Secure
    • Apiiro
    • AppCheck
    • Appdome
    • Appknox
    • Aqua
    • ArmorCode
    • Arnica
    • Astra
    • Base4
    • Bishop Fox
    • Black Duck
    • Black Hills
    • Breachlock
    • Bright Security
    • Burp Suite
    • Checkmarx
    • CloudGuard
    • Cobalt
    • Codacy
    • Conviso
    • Cure53
    • Cycode
    • Cyver
    • Data Theorem
    • DataDog
    • DeepSource
    • DefectDojo
    • Detectify
    • Devel
    • Dryrun Security
    • Dynatrace
    • Edgescan
    • Endor Labs
    • Escape
    • Evolve Security
    • Faraday Security
    • FortiDevSec
    • Fortify
    • GitHub Advanced Security
    • GitLab Ultimate
    • GuardRails
    • HackerOne
    • Hackmetrix
    • Hadrian
    • HCL AppScan
    • Heeler
    • Hopper Security
    • ImmuniWeb
    • Inspectiv
    • Intigriti
    • Intruder
    • Invicti
    • JFrog
    • Jit
    • Kiuwan
    • Legit Security
    • Mandiant
    • Mend
    • Mindgard
    • Moderne
    • NetSPI
    • NowSecure
    • Nucleus Security
    • Oligo Security
    • Orca Security
    • Oversecured
    • OX Security
    • Phoenix Security
    • PlexTrac
    • Praetorian
    • Prancer
    • Prisma Cloud
    • Probely
    • Prowler
    • ReversingLabs
    • RunSybil
    • Safety
    • Securitum
    • Seemplicity
    • Semgrep
    • Snyk
    • Socket
    • SonarQube
    • Sonatype
    • SOOS
    • StackHawk
    • Strike
    • Synacktiv
    • Tenable Nessus
    • ThreatModeler
    • Veracode
    • White Jaguars
    • Wiz
    • Xygeni
    • ZAP
    • ZeroPath

  • Log in to the platform 
  • Home
  • Quick start
      • Billing
      • Integrations
      • Platform
      • Scanner
      • Ask our pentesters to explain a vulnerability
      • Fix code with gen AI from the IDE
      • See safe dependency versions
      • Import repositories to test
      • Invite team members to sign up
      • Billing for the Advanced plan
      • Continuous Hacking free trial, plans and pricing
      • Continuous Hacking methodology
      • Continuous Hacking PoV
      • CVSSF metric
      • Glossary
      • Main website
      • Platform demo
      • Tutorial videos
      • What is DAST?
      • What is SAST?
      • Assign vulnerability remediation to a team member
      • See details of the reported security vulnerabilities
    • Sign up to Fluid Attacks
      • Break the build
      • Install CI Gate to break the build
      • Verify whether a fix was successful
  • Find and fix
    • Access to your assets
      • Cloud
      • Connector
      • Egress
      • Set up an AWS IAM role
      • Summary of mechanisms used to access assets
      • Types of authentication used
      • Fix code automatically with gen AI
      • Get AI-generated guides for remediation
      • Contribute to enhancing the scanners
      • Fluid Attacks' scanners
      • Know and reproduce the scanner’s OWASP Benchmark results
      • Pentesters' tools
    • Machine
      • Configure and use Sorts on your own
      • Introduction to Fluid Attacks' AI tool
      • Accuracy SLA
      • Availability SLA
      • False negatives
      • False positives
      • Response SLA
      • Scope
      • Service-level agreement summary
        • 2023
        • 2024
        • 2025
        • 2026
      • Documentation sections
      • Roadmap
      • Supported AI functions
      • Supported attack surfaces
      • Supported binaries
      • Supported browsers
      • Supported CI/CD
      • Supported clouds
      • Supported CVEs for reachability analysis
      • Supported evidence formats
      • Supported frameworks
      • Supported IDE functionalities
      • Supported languages
      • Supported languages for vulnerability fixes
      • Supported package managers
      • Supported remediation
      • Supported SCM systems
      • Supported secrets
      • Supported standards
      • Supported ticketing systems
      • CVSS score adjustment
      • Find reachable dependency vulnerabilities
      • Vulnerability signature update
      • What is SCA?
      • APK scanner configuration file
      • DAST scanner configuration file
      • SAST scanner configuration file
      • SCA scanner configuration file
      • Scan with a configuration file
    • Use the Platform
        • Platform sections and header items
        • Sign-up and login authentication
        • Create and delete groups
        • Create another organization
        • Know your Groups section
        • Manage a group's configuration
        • Register payment information
        • See the target of evaluation's status and SBOM
        • Sort groups into portfolios
        • Invite contributing developers
        • Manage members
        • Manage your organization's authors
        • Understand roles
        • Import repositories fast and safely with OAuth
        • Manage environments
        • Manage repositories
        • Manage your credentials
        • Resolve events impeding tests
        • See retrieved repositories not yet added to any group
        • Analyze your supply chain security
        • Assign treatments
        • Correlate your threat model to vulnerabilities
        • Examine the evidence of exploitability
        • Request a vulnerability be dismissed as Zero Risk
        • See vulnerabilities assigned to you
        • See where vulnerabilities are and more details
        • Verify fixes with reattacks
        • Ask the AI Agent
        • Ask via chat
        • Post comments
        • Send Fluid Attacks an email
        • Talk to a Pentester
        • Watch certifiable tutorial videos or get a demo
        • Access recent downloads
        • Check your compliance with standards
        • View analytics common to orgs, groups and portfolios
        • Download a report of detected vulnerabilities
        • View analytics for the group level only
        • View analytics for the portfolio level only
        • Use analytics charts options
        • View and download logs
        • Accept vulnerabilities
        • Manage fix prioritization policies
        • Manage security gates
        • Prevent the deployment of builds with vulnerabilities
        • View details of the security of your builds
        • Enable and disable notifications
        • Explore the user menu
        • Leave group
        • Subscribe to news
      • Manage repositories
      • See vulnerabilities
      • Exclude findings from scan reports
      • Run scans locally
      • Understand the scanner output
      • Use standalone scanners
      • Use the scanners in CI/CD
  • Integrations
      • Local tools
      • Access Talk to a Pentester and help from Jira issues
      • Automate Jira issue creation
      • Create Jira issues for vulnerabilities
      • Go to vulnerability evidence and more from Jira issues
      • Install the Fluid Attacks app for Jira Cloud
      • Link vulnerabilities to Jira issues or unlink them
      • Request reattacks from Jira issues
      • Set up the Jira integration
      • Set up the Azure DevOps integration
      • Set up the GitLab integration
      • Install the VS Code extension
      • View vulnerable lines, use fix options and more
      • VS Code extension error and solution catalog
      • Identify and address vulnerabilities from IntelliJ
      • Install the IntelliJ plugin
      • Identify and address vulnerabilities from Cursor
      • Install the Cursor extension
      • AWS Marketplace integration
    • MCP server
      • Installation
      • Capabilities and use cases
      • Docker installation
      • Excluding files from analysis
      • Integrate with Azure DevOps Peer Reviewer Assistant
      • Integrate with GitLab Peer Reviewer Assistant
      • Troubleshooting
      • Introduction
      • Use the API
      • Learn the basics of the Fluid Attacks API
      • Things to know before using the API
  • Stack
      • Bash
      • Python
      • Terraform
      • TypeScript
      • Ariadne
      • Commitlint
      • Docker
      • ESLint
      • GraphQL
      • Hypercorn
      • Kubernetes
      • Labels
      • Mypy
      • Nix Flakes
      • Platform audit logs
      • Platform authentication
      • Platform authorization
      • Pydantic AI
      • React
      • Ruff
      • Sops
      • Starlette
      • Tree-sitter
      • Visual Studio Code
      • AWS
      • Batch
      • Bedrock
      • BigCodeBench
      • BugSnag
      • Checkly
      • Claude 3.5 Sonnet
      • Cloudflare
      • CloudWatch
      • Cost Management
      • Datadog
      • dbt
      • DynamoDB
      • EBS
      • EC2
      • EKS
      • ELB
      • Engineering metrics
      • ePayco
      • EventBridge
      • GitLab
      • GitLab CI
      • Google Workspace
      • IAM
      • Jamf
      • KMS
      • Lambda
      • LogRocket
      • Okta
      • OpenAI
      • OpenSearch
      • Organizations
      • QuickSight
      • S3
      • SageMaker
      • Snowflake
      • Statuspage
      • Step Functions
      • Stripe
      • Treli
      • Ubiquiti
      • Vanta
      • Voyage AI
      • VPC
      • VPN
      • Zoho One
      • Zoho Sign
  • Compliance
      • Clients
      • Password policies
      • Staff
      • Access revocation
      • Endpoint
      • Authorization for clients
      • Authorization for Fluid Attacks staff
      • Secret rotation
      • Secure employee termination
      • Session management
      • Distributed apps
      • Distributed firewall
      • Everything backed up
      • Multiple zones
      • Recovery objective
      • Device (re)enrolling
      • Direct hiring
      • Encryption at rest
      • Encryption in transit
      • No personal gain
      • Personnel NDA
      • Secure deletion
      • Awareness
      • Certification Hub
      • Certified cloud provider
      • Certified security analysts
      • Comprehensive reporting
      • Developing for integrity
      • Extensive hiring process
      • Monitoring
      • Production data not used for dev or test
      • Secure emails
      • Software Artifacts SLSA levels
      • Static website
      • Training plan
      • Everything as code
      • Extensive logs
      • Data privacy policy
      • Data policies
      • Email obfuscation
      • Employee time tracking software
      • Manual for the National Database Registry (NDR)
      • OTR messaging
      • Polygraph tests
      • Project pseudonymization
      • Retention
      • Secure delivery of sensitive data
      • Transparent use of cookies
      • Unsubscribe email
      • Continuity and recovery
      • Equipment and telecommuting
      • Everything is decentralized
      • Redundant roles
      • Complaint management
      • Data leakage policy
      • Ethics hotline
      • Help channel
      • Incident management
      • Information security responsibility
      • Open source
      • Quality policy
      • Status page
      • Testing our technology
      • Vulnerability releasing
  • Compare
    • 42Crunch
    • 7 Way Security
    • Aikido
    • Anvil Secure
    • Apiiro
    • AppCheck
    • Appdome
    • Appknox
    • Aqua
    • ArmorCode
    • Arnica
    • Astra
    • Base4
    • Bishop Fox
    • Black Duck
    • Black Hills
    • Breachlock
    • Bright Security
    • Burp Suite
    • Checkmarx
    • CloudGuard
    • Cobalt
    • Codacy
    • Conviso
    • Cure53
    • Cycode
    • Cyver
    • Data Theorem
    • DataDog
    • DeepSource
    • DefectDojo
    • Detectify
    • Devel
    • Dryrun Security
    • Dynatrace
    • Edgescan
    • Endor Labs
    • Escape
    • Evolve Security
    • Faraday Security
    • FortiDevSec
    • Fortify
    • GitHub Advanced Security
    • GitLab Ultimate
    • GuardRails
    • HackerOne
    • Hackmetrix
    • Hadrian
    • HCL AppScan
    • Heeler
    • Hopper Security
    • ImmuniWeb
    • Inspectiv
    • Intigriti
    • Intruder
    • Invicti
    • JFrog
    • Jit
    • Kiuwan
    • Legit Security
    • Mandiant
    • Mend
    • Mindgard
    • Moderne
    • NetSPI
    • NowSecure
    • Nucleus Security
    • Oligo Security
    • Orca Security
    • Oversecured
    • OX Security
    • Phoenix Security
    • PlexTrac
    • Praetorian
    • Prancer
    • Prisma Cloud
    • Probely
    • Prowler
    • ReversingLabs
    • RunSybil
    • Safety
    • Securitum
    • Seemplicity
    • Semgrep
    • Snyk
    • Socket
    • SonarQube
    • Sonatype
    • SOOS
    • StackHawk
    • Strike
    • Synacktiv
    • Tenable Nessus
    • ThreatModeler
    • Veracode
    • White Jaguars
    • Wiz
    • Xygeni
    • ZAP
    • ZeroPath

  • Log in to the platform 

On This Page

  • Know your environments table
  • Add environments
  • Manage environment secrets
  • Edit environments
  • Remove environments
  • Move environments
  • Exclude Environments
  • Manage mobile apps
  • Add mobile apps to test
  • Update mobile app file
  • Remove mobile app file
Find and fixUse the PlatformManage assets to testManage environments

Manage environments

Fluid Attacks evaluates environments you have appropriately matched with source code repositories . Security testing of environments is done through dynamic application security testing  (DAST) and, exclusively in the Advanced  plan, penetration testing as a service  (PTaaS) and software reverse engineering . You are encouraged to have Fluid Attacks test two environments for every repository you add, provided that one of them is the production environment (read the benefits  below).

Know your environments table

Note

Role  required: User, Vulnerability Manager or Group Manager

The table listing the environments under evaluation is found in your group’s Scope section. Its columns show the following information:

  • URL: The URL address of the environment
  • Type: Whether the environment is for a mobile app  or at a URL
  • Status: The inclusion or exclusion of the environment in the security testing scope; its value can be one of the following:
  • Included: The environment is included for security testing
  • Excluded: The environment is excluded from security testing
  • Open event: A situation prevents the inclusion of the environment for security testing (an icon is provided linking to the event report on the platform)
  • Secrets: Indicates the number of secrets  (credentials) that you or other members have registered to access the environment
  • Connection type: The custom connection through which Fluid Attacks must access the environment; its value can be one of the following:
  • Connector: Environment is behind a private network; a Cloudflare tunnel is configured
  • Egress: Environment is behind a private network; Fluid Attacks’ egress IP addresses are whitelisted
  • Legacy: Access to environment is through a VPN
  • N/A: No custom connection
  • Deployment Stage: Whether the environment is a production or pre-production environment
  • Requires Authentication: Whether or not Fluid Attacks needs credentials to access the environment
See environments tested by Fluid Attacks on the platform

Clicking the downward-facing arrow reveals more information about the environment. Namely, the date it was added, the email address of the group member who added it, and the Git repo(s) to which it is associated.

Know environment details on the Fluid Attacks platform

Add environments

Note

Role  required: User or Group Manager

Tip

You can add two environments per Git repository to be tested, as long as one of the two corresponds to a production environment. Here is why adding the latter, with no additional cost, is recommended:

  1. It includes comprehensive security testing in the production stage.
  2. In the absence of environment parity, testing the production environment means targeting the system’s behavior that is not present in pre-production environments and is what attackers would likely interact with.
  3. Production environments are more stable and less prone to unexpected issues than pre-production ones, which facilitates continuous testing.

For more information, read the FAQ .

Caution

Environments you have marked as ‘production’ (step 6) are not analyzed by the DAST scanner; they are exclusively analyzed by Fluid Attacks’ security analysts in the Advanced plan.

Tip

A vulnerability found in your production environment is reported for production only when it does not also exist in the other non-production environment you have registered.

Tip

Below (step 5) are links for guidance on making environments accessible when located within a private network.

To add environments to the security testing scope, follow these steps:

  1. Access the group ’s Scope section and click the URL of the active Git repository whose environment you wish to add.
Choose repository to add environment on the Fluid Attacks platform
  1. In the pop-up window, choose the Environments tab.
View linked environments on the Fluid Attacks platform
  1. Click on Add environment.
  2. Select the environment type and provide the required information in each case.
Add environment to test on the Fluid Attacks platform

Here is a short definition of each of the options:

  • Mobile App: The environment to test corresponds to a mobile application. This type requires you to choose the previously added mobile app file.
  • URL (microservice, API or web app): The environment to test is at a URL where the application is deployed. This type requires you to provide the URL.
  1. For URL environments, if access is behind a private network, check the condition accordingly. If it is not, leave the Connector and Egress options unchecked.
  • Connector : Cloudflare Tunnel is configured
Tip

Read the Connector connection configuration guide !

  • Egress : Specific IPs need to be whitelisted on your firewall
Tip

Learn about the Egress connection requirements !

Specify connection to environment on the Fluid Attacks platform
  1. Specify whether or not the environment is a production environment and, if applicable, whether it requires authentication.
  2. Click on Confirm to add the environment.
Caution

When checking an environment, an HTTP response code 200 usually means that the request was processed correctly. If this code is not received, there may be several reasons why the environment could have problems, which include

  1. authentication or authorization errors;
  2. data validation errors;
  3. connection or infrastructure problems;
  4. internal server errors.

A status code other than 200 can indicate something is wrong with the environment you are trying to add. In this case, check that you correctly followed the above configuration steps. After verifying this, you can add your environment disregarding the platform warning. Keep in mind that the DAST scanner cannot analyze your environment if it is unreachable.

Tip

Remember to provide the credentials  to your pre-production and production environments.

Manage environment secrets

Note

Role  required: User, Vulnerability Manager or Group Manager

On the platform, you can securely manage secrets (credentials) that grant Fluid Attacks access to environments in order to test them. Follow these steps to add secrets:

  1. Access the group’s Scope section and click the environment’s URL.
  2. Click the Add secret button.
Add environment secret on the Fluid Attacks platform
  1. Add as Key the kind of secret it is (e.g., token) and as Value the actual secret. Optionally, provide a description that can help its use.
Manage environment secrets on the Fluid Attacks platform
  1. Click on Confirm.

The environment secret is added to the table and made available for Fluid Attacks to view. You can view, edit or remove only the secrets you added.

View, edit, or remove secrets on the Fluid Attacks platform

Edit environments

Note

Role  required: User, Vulnerability Manager or Group Manager

You may edit the information on connection type  and whether the environment is a production environment. These are the steps:

  1. Access the group’s Scope section and click the URL of the active Git repository whose environment you wish to edit.
  2. Switch to the Environments tab.
  3. From the Actions column, click on the edit icon.
Edit environment on the Fluid Attacks platform
  1. Make the desired changes and click on Confirm.
Edit production environment on the Fluid Attacks platform

Remove environments

Note

Role  required: Group Manager

In order to remove an environment, follow these steps:

  1. Click on the Git repository to which the environment is linked.
  2. Switch to the Environments tab.
  3. From the Actions column, click the trash can icon corresponding to the environment you wish to delete.
Remove environment on the Fluid Attacks platform
  1. Confirm removal.
Confirm environment removal on the Fluid Attacks platform

Move environments

Note

Role  required: Group Manager

You can move environments across Git repositories within the same group or in a different one. These are the steps:

  1. Access the group’s Scope section and click the URL of the active Git repository whose environment you wish to move.
  2. Switch to the Environments tab.
  3. From the Actions column, click on the move icon.
Move environment on the Fluid Attacks platform
  1. Select the target group.
Move environment to a group on the Fluid Attacks platform
  1. Type in the search box either part of the target repo’s URL, branch or nickname, to activate the dropdown menu from which you can choose the repo.
Change environment root on the Fluid Attacks platform
  1. Click Confirm.

Exclude Environments

Note

Role  required: User or Group Manager

Caution

Warnings:

  1. Excluding a subpath implies it is not considered in vulnerability analysis.
  2. Excluding a main path automatically excludes all of its subpaths.
  3. You cannot activate a subpath if its main environment is inactive.

If you want to exclude from security testing a subpath of a specific environment, follow the steps below:

  1. Go to your group ’s Scope section.
  2. Add the subpath you wish to exclude as you would add an environment to test. To learn how to do the latter, read Add environments .
Add environment to exclude on the Fluid Attacks platform
  1. Click Confirm.
  2. In the table, locate the added subpath and switch the corresponding toggle in the Exclusion status column to off.
Exclude environment from tests on the Fluid Attacks platform
  1. Click on Confirm to apply the exclusion.
Confirm environment exclusion on the Fluid Attacks platform
Tip

Note: Make sure the main path exists before excluding a specific path.

Manage mobile apps

Note

Role  required: User, Vulnerability Manager or Group Manager

Add mobile apps to test

To add mobile apps for testing (e.g., .aab, .ipa, .apk), you can refer to the mobile app distribution platform where it is located or upload the app file directly. Choosing the latter, you can either upload the file in the Add environment window or upload it in Files and then add an environment linking to that file. Here are the steps to upload your mobile app starting from the Add environment window:

  1. Access the group’s Scope section and click on the URL of the repository related to the mobile app. If you have not yet added the repository, do it following the steps in Add a new Git repository .
  2. Switch to the Environments tab and click on Add environment.
  3. Choose ‘Mobile App’ as the environment type.
  4. Choose a mobile app distribution platform or indicate that you will upload the file directly. The supported platforms are TestFlight, Firebase, App Store Connect, and Google Play Store.
Choose mobile app platform on the Fluid Attacks platform

When choosing distribution platforms, you need to indicate your app’s name. And if you choose Firebase, you are also asked to specify the OS for which the app is made (Android or iOS).

Choose app operating system on the Fluid Attacks platform

You are required to grant access to continuous@fluidattacks.org, squad@fluidattacks.com, and continuousatfluidattacks@gmail.com, depending on the chosen distribution platform. Click on the toggle to confirm this step.

Confirm emails granted access on the Fluid Attacks platform

If you are uploading the mobile app file directly, you can select a preuploaded file (steps further below) or upload the file. Its size must not exceed 4.88GB

Upload a mobile app on the Fluid Attacks platform

Additionally, for Fluid Attacks to perform security testing in your environment, you must upload two versions of the application at different times: one with and another without RASP controls (e.g., root detection, emulator detection, SSL pinning). Select the option that corresponds to the file in question.

Select whether the file version includes RASP controls on the Fluid Attacks platform
  1. Lastly, specify if it is a production environment.
Specify production environment on the Fluid Attacks platform
  1. Click on Confirm.

As an alternative, add the mobile app in Files and then link it to an environment:

  1. Access the group’s Scope section and scroll down to Files.
View files section on the Fluid Attacks platform
  1. Click on Add.
  2. Click on the Add file button and choose the mobile app file. Remember, its size must not exceed 4.88GB.
Add mobile app file on the Fluid Attacks platform
  1. Click on Confirm. Your file should now be visible in the table.
  2. Scroll up to Git Repositories. If you have not yet added the repository related to the mobile app in question, do it following the steps in Add a new Git repository .
  3. Click on the repository URL and choose Environments > Add environment.
  4. Choose Mobile App as the environment type, then select the corresponding file from Select a binary file, and specify if it includes RASP controls and if it is a production environment.
Add mobile app environment on the Fluid Attacks platform
  • Click on Confirm.

Update mobile app file

Tip

The platform does not allow replacing a file with one of a different extension.

If you have added your mobile app through TestFlight, Firebase, App Store Connect, and Google Play Store, Fluid Attacks can always get the latest version of your app on those platforms. Otherwise, follow these steps to add a newer version of your mobile app. Do not delete the file, as this causes the platform to mark any ‘Open’ vulnerabilities found in the app as ‘Closed’ (this is undesirable, as you want us to continue testing the app).

  1. Go to Scope > Files.
  2. Click on the mobile app file.
  3. Click on Add file and upload the newer app version.
Update mobile app file on the Fluid Attacks platform
  1. Click on Replace file.
  2. Read the warning message. You acknowledge that the file is linked to an environment, vulnerabilities found in the older file can refer to the newer file, and the latter corresponds to the same mobile app. If you wish to proceed, click on Confirm.
Confirm file update on the Fluid Attacks platform

Remove mobile app file

Caution

Removal causes ‘Open’ vulnerabilities found in the file to be marked as ‘Closed’. Please ensure that you would not rather update the file .

If you are removing a file associated with an environment, you get the following message after step 3 below.

View file removal message on the Fluid Attacks platform

In this case, follow the steps described in Remove environments  instead. This should be done by a Group Manager . As the message says, removing the environment also removes the mobile app file.

If the file is not associated with an environment, do the following:

  1. Go to Scope > Files.
  2. Click on the file to be removed.
  3. Click on Remove.
  1. Click on Confirm.
Confirm file deletion on the Fluid Attacks platform
Tip

Free trialSearch for vulnerabilities in your apps for free with Fluid Attacks’ automated security testing! Start your 21-day free trial  and discover the benefits of the Continuous Hacking  Essential plan . If you prefer the Advanced plan, which includes the expertise of Fluid Attacks’ hacking team, fill out this contact form .

Last updated on February 13, 2026
Import repositories fast and safely with OAuthManage repositories

Fluid Attacks 2026. All rights reserved.