Skip to main content

Find security vulnerabilities

Fluid Attacks is the AppSec company that provides Continuous Hacking, an all-in-one solution to accurately find and help you remediate vulnerabilities throughout the SDLC and ensure secure deployments.

Continuous Hacking plans

Fluid Attacks' Continuous Hacking is offered through two plans:

  • Essential plan: Secure your application with completely automated security testing and vulnerability remediation support.

  • Advanced plan: Leverage the Essential plan features, plus ethical hackers' manual security testing and remediation support.

For a detailed comparison of benefits between Continuous Hacking plans, visit https://fluidattacks.com/plans/.

Free trial

You can enjoy a 21-day free trial of the Essential plan. All you need is a Git repository and a corporate Google, Azure or Bitbucket account.

To learn how to start quickly with Continuous Hacking after signing up, read the page Get things ready for security testing.

Pricing

The Essential plan bills your organization a fixed monthly amount per every group it has on the platform.

The Advanced plan billing for an organization is based on the number of groups and active monthly authors (developers) contributing to its code repositories.

To count authors, Fluid Attacks does the following:

  1. Check the commits recording changes made to the code repositories and integrated to the branch under Continuous Hacking during a month.

  2. Extract metadata of the commits made and store them in an append-only database.

  3. Add the dates on which those commits were first found.

  4. Filter commits for a specific month and remove duplicate authors, as an author might have used other accounts to make some commits in addition to those made using their primary email/account.

The resulting list is what Fluid Attacks uses to calculate the billing for the organization in a given month.

You can check the lists of active monthly authors any time in the Authors section of each group on Fluid Attacks' platform. These lists include the names of the authors and the groups to which they have contributed, the commit IDs (a single example per author) and the repositories' names.

Platform demo

You can request a demo by submitting the form Talk to our experts.

Read the page Live Demo if you are already signed up and would like to request a walkthrough of the platform.

Discover security testing with Fluid Attacks

The next pages give you an idea of what AppSec testing is like with Fluid Attacks.