Young hacker smiling

We hack your software

zero false positives

Attacking Applications, APIs, Mobile Apps Servers, Networks, IoT Devices
ICS: Industrial Control System
SOC: Security Operations Center


System where all the project’s stakeholders come together (hacker, developer, project managers, auditors, product owner, etc). It aims to bring the developer and the hacker closer together in order to remediate all reported vulnerabilities in an effective and efficient manner. It also provides the decision makers with real time information regarding the state of their system´s security.

You can access the product

Easy and Fast Authentication

User credentials are not stored. Federated identity, thus allowing authentication with corporate users.

Main Menu

Main Menu

The dashboard allows users direct access to all their projects. It is also possible to view the events associated to each one of the projects.

Project Indicators

They allow to perform a follow-up of the current state of the project. Some of the used indicators are:

  • The amount of detected vulnerabilities.

  • The current severity of the project.

  • Remediated vulnerabilities.


Project Status Graphs

You can view the current state of the reported vulnerabilities. Easily allowing to:

  • Prioritize vulnerabilities by their confirmed exploitability

  • Indicate which are vulnerabilities and how many are security issues or hygiene issues.

  • Know how many vulnerabilities have been remediated and how many remain open.

View Real-Time Events

All events that inhibit the execution of the project can be viewed in real time.

User Tracking

User tracking

The last access of users to a project is displayed.

User Administration

An user can grant / revoke access to other users using this module.

Administration Access
Technical Report

Generate Technical Reports

This document provides detailed information of each vulnerability. It is of great use to all technical personnel when it comes to remediating the reported security flaws.

Generate Executive Reports

This document provides summarized and organized information. Thus, it may be useful for all the project’s stakeholders.

Executive Report
Prioritize Remediation

Prioritize Remediation

Vulnerabilities can be prioritized based on several parameters. This with the aim of knowing which require an inmediate solution. Some of these parameters are:

  • Age: Time that elapses between the report of the vulnerability and the solution applied by the client.

  • Severity: Criticality according to the CVSS standard.

  • Status: Open, closed or partially closed.

  • Treatment: Assumed, pending or remediate.

View Vulnerabilities

Each vulnerability has information regarding its current state, as well as its severity, type and report date.

Vulnerability Description

Vulnerability Description

Contains technical details that allow for a better understanding of the nature of the vulnerability, location of the security issues, unfulfilled requirements, risks and recommendations for the solution.

Request Verification / Treatment

Clients may request the revision 1 of a vulnerability that has been corrected, and document 2 its treatment. For the documentation, the client has the following options:

  • Accepted: The client assumes the risk that implies not solving the security issue.

  • New: The client still has not decided whether to assume or to remediate the vulnerability.

  • In Progress: The client will solve the security issue.

Request Verification
Vulnerability Severity

Vulnerability Severity

The technical score according to the international CVSS (Common Vulnerability Scoring System) standard is shown. This with the aim of determining the severity of the vulnerability.

Vulnerability Evidences

Existence of a vulnerability is shown through a series of evidences (images) with its respective description.

Vulnerability Evidence
Exploitation Animation

Exploitation Animation

Process executed to exploit the vulnerability is shown through an animation (gif).


The script used to exploit the vulnerability is shown. This can be reused to validate the applied corrections.

By downloading our product Asserts, and following the documentation you may reproduce the attack that takes advantage of the vulnerability and determine autonomously if it was already remedied. When you reproduce an attack, the code that exploits the vulnerability is injected into the application.

Vulnerability Exploitation

Timeline of the Vulnerability

Shows the evolution of the vulnerability across time, indexing the report dates and the different closing cycles performed. This section is of great utility to know the effectiveness of the closing cycles performed.

Compromised Records

Information such as names, identifiers, balances, products, etc. that was compromised during the execution of security tests, through the exploitation of a vulnerability.

Compromised Records
Vulnerability Comments

Doubts regarding the Vulnerabilities

The project’s stakeholders, Fluid Attacks included, may exchange insights, doubts or observations regarding the vulnerability in question. This section helps the developers understand where the issue is located in order to apply a solution.

Chat with Us

It allows the users to solve doubts regarding the vulnerabilities or the platform itself.

The engineering team will reply in less than 4 hours during business hours (8a.m - 5p.m). A notification will also be sent via e-mail once a reply to the question has been posted.


Notifications via e-mail

Notifications are sent via e-mail to the project’s stakeholders. Some of them are:

  • Weekly, regarding changes in vulnerabilities.

  • When a user comments in a specific vulnerability.

  • When a user reports that a vulnerability has been remediated.

  • When a validation of the remediation of a vulnerability is made.

  • When a vulnerability reaches a certain age (15, 30, 60 days old …) and has not been treated.

Knowledge Base

Users have access to Fluid Attacks’s product Defends where they can find examples about how to fulfill the security requirements that are verified in the tests performed.

Knowledge Base

Service status - Terms of Use