Prevent the deployment of builds with vulnerabilities
You can install Fluid Attacks’ CI Gate to automatically enforce the vulnerability acceptance policies.
CI Gate, aligned with your organization’s or group’s general policies , can automatically break builds that contain vulnerabilities that have not been remediated nor accepted . Breaking the build means preventing any software author from deploying a build with said vulnerabilities into production. This mechanism prompts your team to address security issues, effectively prioritizing security at that moment of the software development lifecycle.
A CI Gate token is required for installation of the gate. To use CI Gate, ensure Internet connectivity, so it can connect to Fluid Attacks’ API. Continue reading to learn how to manage this token. Further below are references to configuring policies to break the build and viewing CI Gate’s executions.
Note: Token generation , update , and reset are completely up to your team.
Generate the CI Gate token
Role required: User, Vulnerability Manager or Group Manager
Follow these steps to generate the CI Gate token on Fluid Attacks’ platform:
- Go to the Scope section of the group where you want to use CI Gate.

- Scroll all the way down to locate the CI Gate card.
- Click the Manage token button.

-
In the pop-up window, click on Generate.

Once generated, you can click on Copy to capture the token for immediate use. The token is valid for 180 days and is unique to the group where it is created.

​
You can always come back and click on Reveal token to view it.

Update the CI Gate token
Role required: User, Vulnerability Manager or Group Manager
Fluid Attacks’ platform sends you a notification seven days before the CI Gate token expires .
After your token expires, you must follow the same instructions provided in Generate the CI Gate token . In this case, the pop-up window referred to in step 4 states that the token has expired.

Reset the CI Gate token
Role required: User, Vulnerability Manager or Group Manager
You can reset the CI Gate token while your current one is still valid. Follow these steps:
- Go to your group’s Scope and locate the Manage token button.
- In the pop-up window, click on Reveal token.
- Once your current token is displayed, click the Reset button to generate a new token.

The new token is generated in the pop-up window, and you can copy it for immediate use.
Troubleshooting: If you encounter errors during token management, refresh the Scope section and retry. If the issue persists, contact Fluid Attacks support at help@fluidattacks.com with detailed information about the problem.
Configure policies to break the build
Role required: User, Vulnerability Manager or Group Manager
Fluid Attacks’ platform allows you to configure the following policies related to breaking the build:
- Grace period where newly reported vulnerabilities will not break the buildÂ
- Minimum CVSS score of an open vulnerability to break the buildÂ
- Number of days until vulnerabilities are considered technical debt and do not break the buildÂ
To configure them for your entire organization or for specific groups, go to the Policies section .
To learn about these policies in detail, read Manage security gates .
View the CI Gate execution details
Role required: User, Vulnerability Manager or Group Manager
On Fluid Attacks’ platform, you can inspect the outcomes of each execution of CI Gate for a specific group, such as whether it broke the build and what unremedied vulnerabilities it found. To do it, go to the group’s DevSecOps section. Read about the latter in View details of the security of your builds .
Free trialSearch for vulnerabilities in your apps for free with Fluid Attacks’ automated security testing! Start your 21-day free trial and discover the benefits of the Continuous Hacking Essential plan . If you prefer the Advanced plan, which includes the expertise of Fluid Attacks’ hacking team, fill out this contact form .