See safe dependency versions

Last updated: Mar 19, 2026


Fluid Attacks identifies vulnerable dependencies in your environment and provides intelligent upgrade paths. Instead of a single recommendation, you now receive three distinct options, allowing you to choose the best balance between security and stability for your specific situation.

How to access recommendations

  1. Enter the group where the vulnerability is located, then click on the weakness name.

    Choose the SCA weakness on the Fluid Attacks platform
  2. From the vulnerabilities table, click on the specific third-party software vulnerability you wish to examine.

    Choose package to upgrade on the Fluid Attacks platform
  3. In the pop-up window, switch to the How to fix tab.

    Update options for a direct dependency on Fluid Attacks platform

Understanding the three update options

For every detected vulnerability, Fluid Attacks evaluates the dependency tree and offers three remediation paths:

  • Minimal fix: Patches the specific reported vulnerability but may introduce new vulnerabilities.
  • Safe update: Patches the reported vulnerability without introducing any new ones.
  • Complete fix: Updates to the latest version that is entirely free of all known vulnerabilities.

Direct dependencies

If the vulnerability is found in a package you manage directly, you will see the versions available for a direct upgrade.

Transitive dependencies

For vulnerabilities introduced by sub-dependencies, the platform identifies the direct package responsible for pulling in the vulnerable code. We provide the three remediation versions for the transitive dependency so you can verify parent compatibility or bump the parent package to the minimum supported version.

Update options for a transitive dependency on Fluid Attacks platform

Next steps

Once you have upgraded your dependencies to a recommended, safe version, run a reattack to verify the fix and close the finding.

On this page