0 filters active
Skip to Content
logo
  • Home
  • Quick start
      • Billing
      • Integrations
      • Platform
      • Scanner
      • Ask our pentesters to explain a vulnerability
      • Fix code with gen AI from the IDE
      • See safe dependency versions
      • Import repositories to test
      • Invite team members to sign up
      • Billing for the Advanced plan
      • Continuous Hacking free trial, plans and pricing
      • Continuous Hacking methodology
      • Continuous Hacking PoV
      • CVSSF metric
      • Glossary
      • Main website
      • Platform demo
      • Tutorial videos
      • What is DAST?
      • What is SAST?
      • Assign vulnerability remediation to a team member
      • See details of the reported security vulnerabilities
    • Sign up to Fluid Attacks
      • Break the build
      • Install CI Gate to break the build
      • Verify whether a fix was successful
  • Find and fix
    • Access to your assets
      • Cloud
      • Connector
      • Egress
      • Set up an AWS IAM role
      • Summary of mechanisms used to access assets
      • Types of authentication used
      • Fix code automatically with gen AI
      • Get AI-generated guides for remediation
      • Contribute to enhancing the scanners
      • Fluid Attacks' scanners
      • Know and reproduce the scanner’s OWASP Benchmark results
      • Pentesters' tools
    • Machine
      • Configure and use Sorts on your own
      • Introduction to Fluid Attacks' AI tool
      • Accuracy SLA
      • Availability SLA
      • False negatives
      • False positives
      • Response SLA
      • Scope
      • Service-level agreement summary
        • 2023
        • 2024
        • 2025
        • 2026
      • Documentation sections
      • Roadmap
      • Supported AI functions
      • Supported attack surfaces
      • Supported binaries
      • Supported browsers
      • Supported CI/CD
      • Supported clouds
      • Supported CVEs for reachability analysis
      • Supported evidence formats
      • Supported frameworks
      • Supported IDE functionalities
      • Supported languages
      • Supported languages for vulnerability fixes
      • Supported package managers
      • Supported remediation
      • Supported SCM systems
      • Supported secrets
      • Supported standards
      • Supported ticketing systems
      • CVSS score adjustment
      • Find reachable dependency vulnerabilities
      • Vulnerability signature update
      • What is SCA?
      • APK scanner configuration file
      • DAST scanner configuration file
      • SAST scanner configuration file
      • SCA scanner configuration file
      • Scan with a configuration file
    • Use the Platform
        • Platform sections and header items
        • Sign-up and login authentication
        • Create and delete groups
        • Create another organization
        • Know your Groups section
        • Manage a group's configuration
        • Register payment information
        • See the target of evaluation's status and SBOM
        • Sort groups into portfolios
        • Invite contributing developers
        • Manage members
        • Manage your organization's authors
        • Understand roles
        • Import repositories fast and safely with OAuth
        • Manage environments
        • Manage repositories
        • Manage your credentials
        • Resolve events impeding tests
        • See retrieved repositories not yet added to any group
        • Analyze your supply chain security
        • Assign treatments
        • Correlate your threat model to vulnerabilities
        • Examine the evidence of exploitability
        • Request a vulnerability be dismissed as Zero Risk
        • See vulnerabilities assigned to you
        • See where vulnerabilities are and more details
        • Verify fixes with reattacks
        • Ask the AI Agent
        • Ask via chat
        • Post comments
        • Send Fluid Attacks an email
        • Talk to a Pentester
        • Watch certifiable tutorial videos or get a demo
        • Access recent downloads
        • Check your compliance with standards
        • View analytics common to orgs, groups and portfolios
        • Download a report of detected vulnerabilities
        • View analytics for the group level only
        • View analytics for the portfolio level only
        • Use analytics charts options
        • View and download logs
        • Accept vulnerabilities
        • Manage fix prioritization policies
        • Manage security gates
        • Prevent the deployment of builds with vulnerabilities
        • View details of the security of your builds
        • Enable and disable notifications
        • Explore the user menu
        • Leave group
        • Subscribe to news
      • Manage repositories
      • See vulnerabilities
      • Exclude findings from scan reports
      • Run scans locally
      • Understand the scanner output
      • Use standalone scanners
      • Use the scanners in CI/CD
  • Integrations
      • Local tools
      • Access Talk to a Pentester and help from Jira issues
      • Automate Jira issue creation
      • Create Jira issues for vulnerabilities
      • Go to vulnerability evidence and more from Jira issues
      • Install the Fluid Attacks app for Jira Cloud
      • Link vulnerabilities to Jira issues or unlink them
      • Request reattacks from Jira issues
      • Set up the Jira integration
      • Set up the Azure DevOps integration
      • Set up the GitLab integration
      • Install the VS Code extension
      • View vulnerable lines, use fix options and more
      • VS Code extension error and solution catalog
      • Identify and address vulnerabilities from IntelliJ
      • Install the IntelliJ plugin
      • Identify and address vulnerabilities from Cursor
      • Install the Cursor extension
      • AWS Marketplace integration
    • MCP server
      • Installation
      • Capabilities and use cases
      • Docker installation
      • Excluding files from analysis
      • Integrate with Azure DevOps Peer Reviewer Assistant
      • Integrate with GitLab Peer Reviewer Assistant
      • Troubleshooting
      • Introduction
      • Use the API
      • Learn the basics of the Fluid Attacks API
      • Things to know before using the API
  • Stack
      • Bash
      • Python
      • Terraform
      • TypeScript
      • Ariadne
      • Commitlint
      • Docker
      • ESLint
      • GraphQL
      • Hypercorn
      • Kubernetes
      • Labels
      • Mypy
      • Nix Flakes
      • Platform audit logs
      • Platform authentication
      • Platform authorization
      • Pydantic AI
      • React
      • Ruff
      • Sops
      • Starlette
      • Tree-sitter
      • Visual Studio Code
      • AWS
      • Batch
      • Bedrock
      • BigCodeBench
      • BugSnag
      • Checkly
      • Claude 3.5 Sonnet
      • Cloudflare
      • CloudWatch
      • Cost Management
      • Datadog
      • dbt
      • DynamoDB
      • EBS
      • EC2
      • EKS
      • ELB
      • Engineering metrics
      • ePayco
      • EventBridge
      • GitLab
      • GitLab CI
      • Google Workspace
      • IAM
      • Jamf
      • KMS
      • Lambda
      • LogRocket
      • Okta
      • OpenAI
      • OpenSearch
      • Organizations
      • QuickSight
      • S3
      • SageMaker
      • Snowflake
      • Statuspage
      • Step Functions
      • Stripe
      • Treli
      • Ubiquiti
      • Vanta
      • Voyage AI
      • VPC
      • VPN
      • Zoho One
      • Zoho Sign
  • Compliance
      • Clients
      • Password policies
      • Staff
      • Access revocation
      • Endpoint
      • Authorization for clients
      • Authorization for Fluid Attacks staff
      • Secret rotation
      • Secure employee termination
      • Session management
      • Distributed apps
      • Distributed firewall
      • Everything backed up
      • Multiple zones
      • Recovery objective
      • Device (re)enrolling
      • Direct hiring
      • Encryption at rest
      • Encryption in transit
      • No personal gain
      • Personnel NDA
      • Secure deletion
      • Awareness
      • Certification Hub
      • Certified cloud provider
      • Certified security analysts
      • Comprehensive reporting
      • Developing for integrity
      • Extensive hiring process
      • Monitoring
      • Production data not used for dev or test
      • Secure emails
      • Software Artifacts SLSA levels
      • Static website
      • Training plan
      • Everything as code
      • Extensive logs
      • Data privacy policy
      • Data policies
      • Email obfuscation
      • Employee time tracking software
      • Manual for the National Database Registry (NDR)
      • OTR messaging
      • Polygraph tests
      • Project pseudonymization
      • Retention
      • Secure delivery of sensitive data
      • Transparent use of cookies
      • Unsubscribe email
      • Continuity and recovery
      • Equipment and telecommuting
      • Everything is decentralized
      • Redundant roles
      • Complaint management
      • Data leakage policy
      • Ethics hotline
      • Help channel
      • Incident management
      • Information security responsibility
      • Open source
      • Quality policy
      • Status page
      • Testing our technology
      • Vulnerability releasing
  • Compare
    • 42Crunch
    • 7 Way Security
    • Aikido
    • Anvil Secure
    • Apiiro
    • AppCheck
    • Appdome
    • Appknox
    • Aqua
    • ArmorCode
    • Arnica
    • Astra
    • Base4
    • Bishop Fox
    • Black Duck
    • Black Hills
    • Breachlock
    • Bright Security
    • Burp Suite
    • Checkmarx
    • CloudGuard
    • Cobalt
    • Codacy
    • Conviso
    • Cure53
    • Cycode
    • Cyver
    • Data Theorem
    • DataDog
    • DeepSource
    • DefectDojo
    • Detectify
    • Devel
    • Dryrun Security
    • Dynatrace
    • Edgescan
    • Endor Labs
    • Escape
    • Evolve Security
    • Faraday Security
    • FortiDevSec
    • Fortify
    • GitHub Advanced Security
    • GitLab Ultimate
    • GuardRails
    • HackerOne
    • Hackmetrix
    • Hadrian
    • HCL AppScan
    • Heeler
    • Hopper Security
    • ImmuniWeb
    • Inspectiv
    • Intigriti
    • Intruder
    • Invicti
    • JFrog
    • Jit
    • Kiuwan
    • Legit Security
    • Mandiant
    • Mend
    • Mindgard
    • Moderne
    • NetSPI
    • NowSecure
    • Nucleus Security
    • Oligo Security
    • Orca Security
    • Oversecured
    • OX Security
    • Phoenix Security
    • PlexTrac
    • Praetorian
    • Prancer
    • Prisma Cloud
    • Probely
    • Prowler
    • ReversingLabs
    • RunSybil
    • Safety
    • Securitum
    • Seemplicity
    • Semgrep
    • Snyk
    • Socket
    • SonarQube
    • Sonatype
    • SOOS
    • StackHawk
    • Strike
    • Synacktiv
    • Tenable Nessus
    • ThreatModeler
    • Veracode
    • White Jaguars
    • Wiz
    • Xygeni
    • ZAP
    • ZeroPath

  • Log in to the platform 
  • Home
  • Quick start
      • Billing
      • Integrations
      • Platform
      • Scanner
      • Ask our pentesters to explain a vulnerability
      • Fix code with gen AI from the IDE
      • See safe dependency versions
      • Import repositories to test
      • Invite team members to sign up
      • Billing for the Advanced plan
      • Continuous Hacking free trial, plans and pricing
      • Continuous Hacking methodology
      • Continuous Hacking PoV
      • CVSSF metric
      • Glossary
      • Main website
      • Platform demo
      • Tutorial videos
      • What is DAST?
      • What is SAST?
      • Assign vulnerability remediation to a team member
      • See details of the reported security vulnerabilities
    • Sign up to Fluid Attacks
      • Break the build
      • Install CI Gate to break the build
      • Verify whether a fix was successful
  • Find and fix
    • Access to your assets
      • Cloud
      • Connector
      • Egress
      • Set up an AWS IAM role
      • Summary of mechanisms used to access assets
      • Types of authentication used
      • Fix code automatically with gen AI
      • Get AI-generated guides for remediation
      • Contribute to enhancing the scanners
      • Fluid Attacks' scanners
      • Know and reproduce the scanner’s OWASP Benchmark results
      • Pentesters' tools
    • Machine
      • Configure and use Sorts on your own
      • Introduction to Fluid Attacks' AI tool
      • Accuracy SLA
      • Availability SLA
      • False negatives
      • False positives
      • Response SLA
      • Scope
      • Service-level agreement summary
        • 2023
        • 2024
        • 2025
        • 2026
      • Documentation sections
      • Roadmap
      • Supported AI functions
      • Supported attack surfaces
      • Supported binaries
      • Supported browsers
      • Supported CI/CD
      • Supported clouds
      • Supported CVEs for reachability analysis
      • Supported evidence formats
      • Supported frameworks
      • Supported IDE functionalities
      • Supported languages
      • Supported languages for vulnerability fixes
      • Supported package managers
      • Supported remediation
      • Supported SCM systems
      • Supported secrets
      • Supported standards
      • Supported ticketing systems
      • CVSS score adjustment
      • Find reachable dependency vulnerabilities
      • Vulnerability signature update
      • What is SCA?
      • APK scanner configuration file
      • DAST scanner configuration file
      • SAST scanner configuration file
      • SCA scanner configuration file
      • Scan with a configuration file
    • Use the Platform
        • Platform sections and header items
        • Sign-up and login authentication
        • Create and delete groups
        • Create another organization
        • Know your Groups section
        • Manage a group's configuration
        • Register payment information
        • See the target of evaluation's status and SBOM
        • Sort groups into portfolios
        • Invite contributing developers
        • Manage members
        • Manage your organization's authors
        • Understand roles
        • Import repositories fast and safely with OAuth
        • Manage environments
        • Manage repositories
        • Manage your credentials
        • Resolve events impeding tests
        • See retrieved repositories not yet added to any group
        • Analyze your supply chain security
        • Assign treatments
        • Correlate your threat model to vulnerabilities
        • Examine the evidence of exploitability
        • Request a vulnerability be dismissed as Zero Risk
        • See vulnerabilities assigned to you
        • See where vulnerabilities are and more details
        • Verify fixes with reattacks
        • Ask the AI Agent
        • Ask via chat
        • Post comments
        • Send Fluid Attacks an email
        • Talk to a Pentester
        • Watch certifiable tutorial videos or get a demo
        • Access recent downloads
        • Check your compliance with standards
        • View analytics common to orgs, groups and portfolios
        • Download a report of detected vulnerabilities
        • View analytics for the group level only
        • View analytics for the portfolio level only
        • Use analytics charts options
        • View and download logs
        • Accept vulnerabilities
        • Manage fix prioritization policies
        • Manage security gates
        • Prevent the deployment of builds with vulnerabilities
        • View details of the security of your builds
        • Enable and disable notifications
        • Explore the user menu
        • Leave group
        • Subscribe to news
      • Manage repositories
      • See vulnerabilities
      • Exclude findings from scan reports
      • Run scans locally
      • Understand the scanner output
      • Use standalone scanners
      • Use the scanners in CI/CD
  • Integrations
      • Local tools
      • Access Talk to a Pentester and help from Jira issues
      • Automate Jira issue creation
      • Create Jira issues for vulnerabilities
      • Go to vulnerability evidence and more from Jira issues
      • Install the Fluid Attacks app for Jira Cloud
      • Link vulnerabilities to Jira issues or unlink them
      • Request reattacks from Jira issues
      • Set up the Jira integration
      • Set up the Azure DevOps integration
      • Set up the GitLab integration
      • Install the VS Code extension
      • View vulnerable lines, use fix options and more
      • VS Code extension error and solution catalog
      • Identify and address vulnerabilities from IntelliJ
      • Install the IntelliJ plugin
      • Identify and address vulnerabilities from Cursor
      • Install the Cursor extension
      • AWS Marketplace integration
    • MCP server
      • Installation
      • Capabilities and use cases
      • Docker installation
      • Excluding files from analysis
      • Integrate with Azure DevOps Peer Reviewer Assistant
      • Integrate with GitLab Peer Reviewer Assistant
      • Troubleshooting
      • Introduction
      • Use the API
      • Learn the basics of the Fluid Attacks API
      • Things to know before using the API
  • Stack
      • Bash
      • Python
      • Terraform
      • TypeScript
      • Ariadne
      • Commitlint
      • Docker
      • ESLint
      • GraphQL
      • Hypercorn
      • Kubernetes
      • Labels
      • Mypy
      • Nix Flakes
      • Platform audit logs
      • Platform authentication
      • Platform authorization
      • Pydantic AI
      • React
      • Ruff
      • Sops
      • Starlette
      • Tree-sitter
      • Visual Studio Code
      • AWS
      • Batch
      • Bedrock
      • BigCodeBench
      • BugSnag
      • Checkly
      • Claude 3.5 Sonnet
      • Cloudflare
      • CloudWatch
      • Cost Management
      • Datadog
      • dbt
      • DynamoDB
      • EBS
      • EC2
      • EKS
      • ELB
      • Engineering metrics
      • ePayco
      • EventBridge
      • GitLab
      • GitLab CI
      • Google Workspace
      • IAM
      • Jamf
      • KMS
      • Lambda
      • LogRocket
      • Okta
      • OpenAI
      • OpenSearch
      • Organizations
      • QuickSight
      • S3
      • SageMaker
      • Snowflake
      • Statuspage
      • Step Functions
      • Stripe
      • Treli
      • Ubiquiti
      • Vanta
      • Voyage AI
      • VPC
      • VPN
      • Zoho One
      • Zoho Sign
  • Compliance
      • Clients
      • Password policies
      • Staff
      • Access revocation
      • Endpoint
      • Authorization for clients
      • Authorization for Fluid Attacks staff
      • Secret rotation
      • Secure employee termination
      • Session management
      • Distributed apps
      • Distributed firewall
      • Everything backed up
      • Multiple zones
      • Recovery objective
      • Device (re)enrolling
      • Direct hiring
      • Encryption at rest
      • Encryption in transit
      • No personal gain
      • Personnel NDA
      • Secure deletion
      • Awareness
      • Certification Hub
      • Certified cloud provider
      • Certified security analysts
      • Comprehensive reporting
      • Developing for integrity
      • Extensive hiring process
      • Monitoring
      • Production data not used for dev or test
      • Secure emails
      • Software Artifacts SLSA levels
      • Static website
      • Training plan
      • Everything as code
      • Extensive logs
      • Data privacy policy
      • Data policies
      • Email obfuscation
      • Employee time tracking software
      • Manual for the National Database Registry (NDR)
      • OTR messaging
      • Polygraph tests
      • Project pseudonymization
      • Retention
      • Secure delivery of sensitive data
      • Transparent use of cookies
      • Unsubscribe email
      • Continuity and recovery
      • Equipment and telecommuting
      • Everything is decentralized
      • Redundant roles
      • Complaint management
      • Data leakage policy
      • Ethics hotline
      • Help channel
      • Incident management
      • Information security responsibility
      • Open source
      • Quality policy
      • Status page
      • Testing our technology
      • Vulnerability releasing
  • Compare
    • 42Crunch
    • 7 Way Security
    • Aikido
    • Anvil Secure
    • Apiiro
    • AppCheck
    • Appdome
    • Appknox
    • Aqua
    • ArmorCode
    • Arnica
    • Astra
    • Base4
    • Bishop Fox
    • Black Duck
    • Black Hills
    • Breachlock
    • Bright Security
    • Burp Suite
    • Checkmarx
    • CloudGuard
    • Cobalt
    • Codacy
    • Conviso
    • Cure53
    • Cycode
    • Cyver
    • Data Theorem
    • DataDog
    • DeepSource
    • DefectDojo
    • Detectify
    • Devel
    • Dryrun Security
    • Dynatrace
    • Edgescan
    • Endor Labs
    • Escape
    • Evolve Security
    • Faraday Security
    • FortiDevSec
    • Fortify
    • GitHub Advanced Security
    • GitLab Ultimate
    • GuardRails
    • HackerOne
    • Hackmetrix
    • Hadrian
    • HCL AppScan
    • Heeler
    • Hopper Security
    • ImmuniWeb
    • Inspectiv
    • Intigriti
    • Intruder
    • Invicti
    • JFrog
    • Jit
    • Kiuwan
    • Legit Security
    • Mandiant
    • Mend
    • Mindgard
    • Moderne
    • NetSPI
    • NowSecure
    • Nucleus Security
    • Oligo Security
    • Orca Security
    • Oversecured
    • OX Security
    • Phoenix Security
    • PlexTrac
    • Praetorian
    • Prancer
    • Prisma Cloud
    • Probely
    • Prowler
    • ReversingLabs
    • RunSybil
    • Safety
    • Securitum
    • Seemplicity
    • Semgrep
    • Snyk
    • Socket
    • SonarQube
    • Sonatype
    • SOOS
    • StackHawk
    • Strike
    • Synacktiv
    • Tenable Nessus
    • ThreatModeler
    • Veracode
    • White Jaguars
    • Wiz
    • Xygeni
    • ZAP
    • ZeroPath

  • Log in to the platform 

On This Page

  • Groups
  • What is a group?
  • Why create several groups?
  • What is the process behind group deletion?
  • Vulnerabilities
  • What are vulnerabilities?
  • What is the difference between Age and Last report in the Vulnerabilities table?
  • How do I suggest that a reported vulnerability is a false positive?
  • How can I see only the findings of the dynamic application security testing (DAST)?
  • Why is the severity score in the platform lower than in external sources?
  • How can I see vulnerabilities specific to a particular Git repository?
  • Why are vulnerabilities found on very old files?
  • Is the same vulnerability reported separately for production and other environments?
  • How does the SLA apply if I find an overlooked vulnerability in a production environment?
  • Why did security testing under the Essential plan fail to find vulnerabilities?
  • What is Fluid Attacks’ time to detect?
  • What influenced the duration it took to detect the vulnerability?
  • How to evaluate the suitability of a security provider?
  • Does Fluid Attacks explain how to remediate a vulnerability?
  • Can I have detailed conversations with someone at Fluid Attacks about the detected vulnerabilities?
  • Evidence
  • How many pieces of evidence (images and videos) do I have access to?
  • Scope
  • What is a nickname?
  • Where can I find my repository’s nickname?
  • What is included in the scope of Continuous Hacking, and what is not?
  • How many branches does Fluid Attacks test?
  • How many environments does Fluid Attacks test?
  • Can security testing to production environments affect their availability?
  • Are production environments only tested to verify vulnerabilities in pre-production ones?
  • Why test production environments if QA can be tested instead?
  • Can I remove a repository from the platform?
  • Does Fluid Attacks test the security of email servers?
  • Does Fluid Attacks test low-code applications?
  • Reattacks
  • How many hours do I have to wait for a response to a reattack request?
  • How do I request a reattack?
  • How do I know that a requested reattack is in progress?
  • I am unable to request a reattack; why?
  • Security testing certificates
  • How do I generate a service certificate?
  • Reports
  • How do I generate the vulnerability report?
  • What is the difference between executive and technical reports?
  • What security requirements does Fluid Attacks verify?
  • Members
  • What is the difference between members and authors?
  • Comments
  • What is the difference between the two comment alternatives?
  • Treatments
  • Why does a vulnerability status still appear as “Vulnerable” when I have permanently accepted it?
  • What happens when a temporary acceptance treatment expires?
  • Policies
  • If I apply policies to a group, will these apply to all its repos?
  • What is the difference between policy at the organization level and the group level?
  • CI Gate
  • Must I only install Docker to run the CI Gate from my local machine?
  • Does Fluid Attacks’ CI Gate run locally or on the development infrastructure?
  • Is Internet connection required for using the CI Gate?
  • How many arguments can I pass to run Fluid Attacks’ CI Gate?
  • How often is it advisable to do “docker pull” to update the image?
  • In what mode can Fluid Attacks’ agent be run so it doesn’t break the build?
  • Must all team members use the same token to run the CI Gate in a group?
  • Do CI Gate executions fail in the case of service unavailability?
  • Platform problems
  • What can I do if I do not see information when I enter the groups?
  • What can I do if I cannot access the platform?
Quick startFaqPlatform

Platform FAQ

This section answers frequently asked questions about Fluid Attacks’ platform .

Groups

What is a group?

A group  is an independent management unit (i.e., that which has its own access permissions, reports and policies) within an organization on the platform. Each group is composed of a set of repository(s) and environment(s) of the evaluated system of which vulnerabilities to manage are reported. Ideally, a group should include all repositories that make up the system, including those containing backend, frontend, and infrastructure as code. Inside a group on the platform , there are several sections that can be accessed according to the role  and plan to which you are subscribed. (For more information on groups and sections, read the page Know your group section .)

Why create several groups?

It is recommended that several separate groups, each dedicated to a specific set of repository(s) and environment(s) of the evaluated system, be created  to facilitate vulnerability  management. These are the benefits:

  1. Independent access: Access permissions  are particular to each group, therefore, having multiple groups allows for a better access control. A common practice is to create a separate group for each distinct work team. Further, please note that your organization’s members  can belong to multiple groups and have different permissions across them.
  2. Independent reports: Vulnerability reports  are particular to each group, which is helpful when sharing them with auditors or other third parties who might need the vulnerability management evidence regarding specific repositories and environments.
  3. Independent vulnerability management tracking: Analytics  are generated for each group, which allows knowledge of the security status of specific repositories and environments as well as insights on the vulnerability management practices of each work team.
  4. Independent policies: Policies  may be set at a group level so that they reflect the criticality of the assessed application and be enforced in its CI/CD process.

What is the process behind group deletion?

Group deletion is managed by Amazon Web Services (AWS), who provide the architecture for the platform. That is, when you delete a group, the platform sends the request to AWS, and they take it from there. AWS holds several internationally renowned compliance and security certifications and is therefore trusted by Fluid Attacks to securely delete client data.

Vulnerabilities

What are vulnerabilities?

Security vulnerabilities  are weaknesses in IT systems that are usually the result of software bugs, design errors, or misconfigurations associated with noncompliance with cybersecurity requirements . When attackers exploit vulnerabilities, they can gain unauthorized access to and control over the system for the theft of information or other assets or the disruption of operations, among other things.

What is the difference between Age and Last report in the Vulnerabilities table?

Age refers to the number of days that have passed since the first discovery of that type of vulnerability  in your software. In contrast, Last report refers to the number of days that have passed since a vulnerability of that type was last detected in your software.

How do I suggest that a reported vulnerability is a false positive?

You must select the option “Request zero risk ” on the platform as the treatment  for that vulnerability.

How can I see only the findings of the dynamic application security testing (DAST)?

In the Vulnerabilities  table  of a specific vulnerability type, you can use the search bar and type “DAST” to see only the vulnerabilities detected with this technique.

Why is the severity score in the platform lower than in external sources?

Fluid Attacks adjusts the CVSS  scores of known vulnerabilities found with SCA  in your software, as your system’s context might not meet the circumstances required to exploit these flaws. Specifically, Fluid Attacks accurately defines the values of Exploit Code Maturity, Remediation Level, and Report Confidence. The adjustments often result in lower scores compared to those reported by external sources like the National Vulnerability Database (NVD). For more details, refer to CVSS score adjustment .

How can I see vulnerabilities specific to a particular Git repository?

In the search bar  that you can find in the Vulnerabilities table , enter the nickname of the repository you are interested in, and the table will show you only the vulnerabilities reported in that repository.

Why are vulnerabilities found on very old files?

Some factors for this may be the following:

  1. The Continuous Hacking project started long after the software product started to be built and you decided not to do a Health Check  that involves Fluid Attacks’ pentesters’ manual review of the old code.
  2. You added an old repository with code already built and the corresponding Health check was not requested.
  3. You requested a Health Check, which was conducted, but, as Fluid Attacks’ pentesters assessing your code are changed throughout time, only now the team found these vulnerabilities.

Is the same vulnerability reported separately for production and other environments?

No. If one vulnerability is found in the development/QA/UAT environment as well as in the production environment, it is reported as one.

How does the SLA apply if I find an overlooked vulnerability in a production environment?

The accuracy SLA  applies normally. Check the criteria in Report false negatives .

Why did security testing under the Essential plan fail to find vulnerabilities?

Essential  is an vulnerability scanning plan, i.e., security testing is done with automated tools only. Automatic scanning has the advantages of being fast to run and very scalable. However, it has these main disadvantages:

  1. It only finds between 10% to 30% of the total risk exposure  of a system, the rest can only be confirmed manually (e.g., through business flows that require environment, authentication, test data, etc.).
  2. If the scanner is configured to detect a higher percentage of vulnerabilities than described above, it starts to report more false positives than real alerts.

For these reasons, in many occasions vulnerability detection is only possible through security testing in the Advanced plan (which includes penetration testing as a service, reverse engineering and secure code review conducted by pentesters helped with tools ).

What is Fluid Attacks’ time to detect?

Fluid Attacks performs security testing using a combination of it AI-powered automated tools and team of security experts, as they complement each other effectively:

  1. Automation is fast but typically detects only 20%–30% of risk exposure. This is a common industry limitation, as not all vulnerabilities can be identified automatically.
  2. Manual testing takes longer but ensures more comprehensive detection (available only in the Advanced plan). To optimize this process, Fluid Attacks uses AI to predict high-risk files  and prioritize their review.

While Fluid Attacks does not offer a formal SLA for detection time, there is a 90% accuracy SLA, which covers both false positives and false negatives. If you identify any unreported vulnerabilities , Fluid Attacks appreciates receiving information about them.

However, even more critical than time to detect is the concept of window of exposure — the time a vulnerability remains without remediation, which defines real risk. To help reduce this window, Fluid Attacks provides GenAI-guided remediation  and Talk to a Pentester  sessions to support you with more complex issues.

Understand window of exposure

What influenced the duration it took to detect the vulnerability?

Fluid Attacks’ solution is designed to test in parallel with the development process, but certain situations may impact the detection time, such as the following:

  1. Lack of a Health Check  in applications with prior development
  2. Testing in the wrong branch or environment, resulting in accumulated changes and delayed commits to Fluid Attacks
  3. Missing key resources, such as credentials or permissions, delaying test execution
  4. Vulnerabilities are zero days in third-party software only just disclosed (continuous testing of applications is crucial to identify these threats as soon as they emerge)
  5. Sometimes human error can cause delays (Fluid Attacks mitigates this using an AI tool that helps its experts prioritize high-risk files, rotating pentester teams for varied reviews, and having dedicated teams to discard potential false positives and search deeper to reduce false negatives)

How to evaluate the suitability of a security provider?

Security provider performance should instead be measured using F-Scores. This allows taking into account legitimate findings (TP), rework for engineering teams (FP), and overlooked risk (FN). The following illustration helps understand the definition of these metrics.

Accuracy measurement chart

Now take the image below as an example to compare the results of three providers. Basing comparison on TP alone, while it might be accurate to say A has a better performance than B, an error can be made if C is said to be better than A. That is because even though C reports twice the number of TP as A, it also reports two times more FP.

Comparison of accuracy by provider

The F-Score model accurately measures the performance of tools or providers. The F2 Score alone (see formula in the note below) equals an accuracy percentage (based on vulnerability quantity) of 36% for tool A and 34% for tool C, proving that basing performance in FP quantity is misleading and could mean much more (unfruitful) rework. Fluid Attacks’ Advanced plan offers a 90% accuracy SLA , measured in both F2 score and F0.5 score (which focuses on risk more than quantity).

Note

F2 Score = 1.25 _ {[Precision _ Recall] / [(0.25 * Precision) + Recall]}, where

  1. Precision = TP / (TP + FP)
  2. Recall = TP / (TP + FN)
Note

Fluid Attacks only tests applications for which you provide source code. If you upload an environment without its corresponding code, or this environment belongs to a third-party app, it will not be tested.

Does Fluid Attacks explain how to remediate a vulnerability?

For vulnerability remediation details, Fluid Attacks has a feature in its IDE extension  and in its platform  that allows generative artificial intelligence to create remediation guides that show developers the steps for remediation alternatives. These guides are not guaranteed to be precise and require validation by a developer having the system’s context in mind. Considering these guides is, however, an excellent starting point to start remediating issues. No one at Fluid Attacks is authorized to give remediation recommendations. Advanced plan users do have an exclusive help option  whereby they can talk to one of Fluid Attacks’ pentesters about the detected vulnerabilities.

Can I have detailed conversations with someone at Fluid Attacks about the detected vulnerabilities?

Yes, but only with the Advanced plan. Any user from the client’s side, including vendors, can request a vulnerability clarification meeting through the Talk to a Pentester  feature. The individuals from Fluid Attacks’ team assigned to these meetings are fully capable of effectively communicating the risks associated with a vulnerability, helping your organization to proceed with remediation. Depending on the complexity of the vulnerability, the Talk to a Pentester representative may invite the original security analysts who discovered it for further clarification. However, the Talk to a Pentester expert remains the most suitable person to facilitate these discussions.

Evidence

How many pieces of evidence (images and videos) do I have access to?

There is a limit of six files (images or videos). However, these are constantly updated according to the reattacks or new vulnerabilities that may be reported.

Scope

What is a nickname?

A nickname is a term a team gives to a repository  or set of credentials  to make it easier to find or identify.

Where can I find my repository’s nickname?

You can find it in the Git Repositories  table in the Scope section.

What is included in the scope of Continuous Hacking, and what is not?

What is included in the scope of Fluid Attacks  follows these two conditions:

  1. Fluid Attacks has access to the repository and branch where the vulnerability is present before the corresponding vulnerable code was written.
  2. Fluid Attacks has access to the repository and branch where the vulnerability is present after the corresponding vulnerable code was written, and Continuous Hacking  is requested.

Any other scenario is outside the scope. Some examples, not necessarily exhaustive, include:

  1. An environment is registered, but its source code is not.
  2. An environment is registered, but it does not correspond to the registered source code.
  3. A vulnerable service is consumed insecurely, and the service is not registered with its source code, but the consumer is.

How many branches does Fluid Attacks test?

Fluid Attacks allows scanning an unlimited number of branches contributing to the repository added on the platform and manually tests only one registered branch and its corresponding environments. Read more on this in Branch testing coverage .

How many environments does Fluid Attacks test?

Fluid Attacks tests two environments per repository, provided one of them is the production environment. Bear in mind that Fluid Attacks needs the credentials  for both environments.

Can security testing to production environments affect their availability?

While it might, the risk is minimal. When Fluid Attacks needs to perform testing that might affect your application’s availability, you are notified of the potential issue through an event  and asked for a suitable time slot to carry out the testing.

Are production environments only tested to verify vulnerabilities in pre-production ones?

No. Fluid Attacks tests production environments completely.

Why test production environments if QA can be tested instead?

It is very likely that QA cannot reproduce the production environment exactly. Being unable to analyze the latter might be an obstacle, partly because if a vulnerability is missed, the question arises whether the tests were faulty or the analyzed environment did not reproduce the functionalities as they appear in production. Most importantly, testing software in production means securing its functionalities in the state that malicious attackers are very likely targeting. Bear in mind, Fluid Attacks tests this environment at no additional cost .

Can I remove a repository from the platform?

Yes, by using the deactivation option  in the Scope section. Bear in mind that, although Fluid Attacks would no longer be in possession of the repository clone, for security and compliance  reasons, the platform would keep a comprehensive audit trail, which serves as a critical record of all activities, including scan results and detected vulnerabilities. History that the repository was added and tested, as well as that vulnerabilities were found, cannot be removed, as this would be the same as erasing an event from an official log, which goes against standards and best practices.

The deactivation functionality allows you to effectively remove the repository clone, stop testing by Fluid Attacks in that repository, and mark its ‘Open’ vulnerabilities as ‘Closed’. This approach satisfies both your need to manage vulnerabilities with Fluid Attacks in selected repositories and the platform’s requirement to maintain a complete and secure history.

Does Fluid Attacks test the security of email servers?

Not currently. However, Fluid Attacks has plans to implement comprehensive email server vulnerability analysis using a multilayered approach, as described in the corresponding GitLab issue .

Does Fluid Attacks test low-code applications?

No. The Continuous Hacking methodology requires  having source code stored in a Git version control system, which is a capability low-code platforms do not provide.

Reattacks

How many hours do I have to wait for a response to a reattack request?

The maximum time you would have to wait would be 16 office hours, according to our service-level agreement .

How do I request a reattack?

You can request a reattack  from the Vulnerabilities and To-do sections. Select the vulnerability to be reevaluated and click the Reattack button. Then, the chosen vulnerability will show the “Requested” status in the Reattack column for up to 16 hours. Remember to check the Comments  section for any new comments on the reattack.

How do I know that a requested reattack is in progress?

You must verify that the Reattack column in the Vulnerabilities  section shows the “Requested” status for the vulnerability you wish to be reevaluated. You can also check in the Comments  section whether there are comments on the request.

I am unable to request a reattack; why?

The most common reason is that the repository is not synchronized. See the Scope section to verify there were no errors when cloning the Git repositories.

Another reason may be that you are trying to request a reattack for a vulnerability reported by our tool when, in fact, you have not made any new changes to your repository. That is, the last commit analyzed by the tool is the last one from your repository. So, if you were to run the reattack, the results would be the same. Therefore, you should first try to remediate the vulnerability in your repository.

If you continue having problems with the reattack request after applying the above, please get in touch with us at help@fluidattacks.com.

Security testing certificates

How do I generate a service certificate?

In the Vulnerabilities  section, click the Generate report button and select the Certificate option. However, this option will not be available if you have not filled out the Business Registration Number and Business Name fields in the Information section. Remember that the roles that can download certifications are User Manager  and Vulnerability Manager .

Reports

How do I generate the vulnerability report?

In the Vulnerability  section, click the Generate report  button and select which type of report you want to download, either technical or executive. Remember that you must register your mobile number  beforehand to enable two-factor authentication to download the report. The roles that can download reports are User Manager  and Vulnerability Manager .

What is the difference between executive and technical reports?

The executive report is a summary report in PDF format generally intended for personnel in management roles. This report contains concise and clear information on the vulnerabilities reported in the group. On the other hand, the technical report is an XLSX file where you have all the vulnerabilities reported in the group with their technical details.

What security requirements does Fluid Attacks verify?

Fluid Attacks verifies compliance with a vast amount of security requirements , which it has classified into the following categories: Architecture , authentication , authorization , certificates , credentials , cryptography , data , devices , emails , files , legal , logs , networks , privacy , services , session , social , source , system , and virtualization .

Members

What is the difference between members and authors?

Members  refer to all users who can access your group to visualize information or manage vulnerabilities, scope and tags, among other things. Authors  are all the developers, professionals, or bots who contribute to the repositories under evaluation.

Comments

What is the difference between the two comment alternatives?

Comments is one of Fluid Attacks’ communication channels with users. You can find it in the Vulnerabilities and Events sections. Use the Vulnerabilities  one when you have questions regarding a specific vulnerability. And use the Events  one to ask about the status or details of situations that prevent security testing from resuming.

Treatments

Why does a vulnerability status still appear as “Vulnerable” when I have permanently accepted it?

When you permanently accept a vulnerability, your organization assumes the risk of not remediating it, but this does not mean the vulnerability no longer exists or that your software is now free of it.

What happens when a temporary acceptance treatment expires?

In such a case, the treatment for the security issue in question is again shown as “Untreated” and the remediation is assigned to the user who requested the temporary acceptance.

Policies

If I apply policies to a group, will these apply to all its repos?

Yes, group policies will apply to all repositories added to that group.

What is the difference between policy at the organization level and the group level?

Organization policies  are those that you establish globally and are inherited by all groups belonging to an organization. Group-level policies , on the other hand, allow you to set variations on the above policies for specific groups.

CI Gate

Must I only install Docker to run the CI Gate from my local machine?

Yes. For more information, please read Install CI Gate to break the build .

Does Fluid Attacks’ CI Gate run locally or on the development infrastructure?

You can run it both ways.

Is Internet connection required for using the CI Gate?

Yes. CI Gate requires access to the Internet to connect with the Fluid Attacks API.

How many arguments can I pass to run Fluid Attacks’ CI Gate?

You can pass multiple arguments .

How often is it advisable to do “docker pull” to update the image?

It is up to you to do it weekly or monthly.

In what mode can Fluid Attacks’ agent be run so it doesn’t break the build?

In “lax mode ,” opposite to “strict mode.”

Must all team members use the same token to run the CI Gate in a group?

Yes. To acquire the token, go to the CI Gate section in Scope .

Do CI Gate executions fail in the case of service unavailability?

CI Gate executions fail only in the case of total service unavailability. Meaning that CI Gate can operate even if API availability is intermittent, as it is programmed to retry executions. Service availability is guaranteed by Fluid Attacks’ 99.95% availability SLA .

Platform problems

What can I do if I do not see information when I enter the groups?

Please log out of the platform, delete your browser’s cache and cookies, log back in, and enter the groups with the inconvenience.

What can I do if I cannot access the platform?

Try to access the platform from incognito mode or another browser and check if the problem persists. Make sure to visit the status page  to check if there is a known outage affecting other users. If it seems to be just you, please email us at help@fluidattacks.com.

Tip

Want to dive deep into the platform? Watch tutorial videos  and get a certification for free.

Last updated on February 13, 2026
IntegrationsScanner

Fluid Attacks 2026. All rights reserved.