Young hacker smiling

Frequently asked questions

Up next are a series of commonly asked questions that come to mind when discussing Continuous Hacking.

  1. What is Continuous Hacking?

    The service that allows an organization to implement security testing at an early stage in the software development life cycle. The objective of the service is to guarantee 100% coverage of the application.

  2. What benefits does Continuous Hacking have, when applied to an application?

    1. Minimizing the repairing cost since the tests are done when the application is in a development environment and not a production one.

    2. Reducing the certification time to zero since the tests are done along with the development.

    3. Giving clear and detailed information about the detected vulnerabilities, allowing synchronization amongst all people involved in the project and resolving all doubts and questions the developers may have regarding the reported vulnerabilities, thus allowing them to fix all issues without any setbacks.

  3. What are the necessary inputs and requirements needed for the service?

    The service can be offered in the following phases:

    1. Phase 1: The most important input needed for the service is access to the integration branch of the repository where the application’s source code is stored. In this phase, there still does not exist a deployed application and, therefore, the security testing focuses on the source code.

    2. Phase 2: In addition to the prior, and when the project has a deployed application (Integration Environment), the tests coverage increases to include application security testing.

    3. Phase 3: This phase is transversal to the others and applies only if the infrastructure that supports the application is defined as code and kept in the repository mentioned in Phase 1. This phase includes infrastructure in the security testing.

  4. What type of tests does the Continuous Hacking Service include?

    The service includes source code analysis, application security testing(see question 3) and infrastructure security testing(see question 3).

  5. What limits does the service have?

    The service has a monthly limit of 10,000 deltas on the source code.

  6. What is a delta?

    It is the variable that indicates a change in the source code. This variation can either be the addition or removal of a line of code.

  7. If I exceed the monthly limit for the service, can I choose to increase it?

    Yes. The scope can be increased for a particular month or in general for the duration of the project.

  8. Is the service a series of automated tools or is it the result of a manual


    Automated tools are not capable of extracting sensitive business information such as client or employee information that add more criticality and value to the vulnerability. FLUIDAttackss service is performed by an expert using a series of tools acquired and developed by FLUIDAttacks that help the exploitation process. We use this method because automated tools present the following problems:

    1. Lack of detection of the majority of the vulnerabilities (they detect a minimal percentage of the existing ones).

    2. The ones they do report are mainly false positives.

    3. Tools are not capable of combining the vulnerabilities to increase the level of exploitation.

  9. If the hacking is done manually, how does FLUIDAttacks assure agile

    development cycles are not slowed down?

    Hacking is first performed on the source code, therefore allowing for parallel security testing and development (see Phase 1 in question 3), which minimizes the dependency on functional environments and the need for coordination between hackers and developers. Once vulnerabilities are found they are prioritized by the agile project´s product owner according to their criticity, leaving the decision of what findings are prioritized for each sprint solely to the product owner. At last, it is important to clarify that, unless we are dealing with a company with daily CI/CD (Continuous Integration/Continuous Deployment), not all sprints generate code that is eligible for release and deployment on productive environments, which helps improve the remedial time.

  10. If the hacking is done manually, how can a big project escalate as more

    and more developers join the team?

    The standard service levels allow the coverage of 95% of all business applications being developed. For the remaining cases, it is possible to expand the limits of the service (see question 7) to evaluate the system when this grows at an unexpected rate.

  11. If the hacking is done manually, how does it escalate when a client

    has a very big application portfolio and in constant growth?

    According to our historical data, recruitment and training capabilities, and our internal innovation processes, FLUIDAttacks is fully capable of taking on anywhere between 5 and 10 new applications each month under the continuous hacking service.

  12. Does the cost of the service vary according to the scope or

    developed phases?

    No. There is a fixed cost for the service during the validity of the contract, keeping in mind that if there is a change of year during the contract there will be an increase in the cost that was previously agreed on in the contract.

  13. Why is it necessary to have access to the source code stored in the


    The Continuous Hacking service is based on always testing the latest version available by executing continuous security testing.

  14. When does the service begin?

    From the moment that we have access to the source code and repository.

  15. Is it possible to hire an OnPremise continuous hacking service?

    Given the operational model that supports the service, it can only be given remotely.

  16. Is it possible to schedule follow up meetings?

    All applications subscribed to the Continuous Hacking service have a project leader assigned and available to attend all required meetings with previous notice in order to schedule availability.

  17. How is the project’s progress determined?

    We offer the following metrics that allow to determine the current state of the project:

    1. Source code coverage indicator.

    2. Percentage of remediated vulnerabilities.

  18. When does the service end?

    The service is hired for a minimum of 12 months, renewed automatically once the time has elapsed. The finalization of the service is given by common agreement after a written request through the defined channels.

  19. Can the subscription be cancelled at any point in time?

    The service can be cancelled at any time after the fourth month. The cancellation of the service can be requested through any communication channel defined in the project.

  20. If the coverage of my application reaches 100%, is the service suspended

    until new code is added to the repository?

    No. Even if 100% coverage is reached, we continue checking the source code already tested in order to rule out false negatives, including components developed by third parties in our tests.

  21. What is a vulnerability?

    It is any situation that represents a security risk (Integrity, Availability, Confidentiality, Non-repudiation) for the application.

  22. How is the technical criticity of a vulnerability calculated?

    We use the CVSS international standard to obtain a quantitative measure that goes from 0 to 10, 0 being the lowest and 10 the highest and most critical according to the qualitative characteristics of the vulnerability.

  23. How can I obtain information regarding the vulnerabilities found in my


    The Continuous Hacking service has an interactive report platform called Integrates. This allows all project stakeholders to have access to the details of the vulnerabilities reported by FLUIDAttacks.

  24. What types of reports are generated during the service?

    From Integrates it is possible to generate a technical report in Excel and PDF formats during the execution of the project. Once the project has ended, it is possible to generate an presentation and an executive report in a PDF format.

  25. What is the next step after FLUIDAttacks reports a vulnerability?

    Once a vulnerability is reported, the main objective is for it to be remediated. To achieve this, the developers have access to Integrates, allowing them to obtain first-hand detailed information regarding the vulnerability in order to apply the necessary corrective measures to eliminate the existing vulnerability from the application.

  26. How does FLUIDAttacks know a vulnerability has been remediated?

    Through Integrates, any user with access to the project can request the verification of a remediated vulnerability. Once the verification is requested, we receive a notification that includes a comment regarding the applied solution, we perform a closing verification to confirm the effectiveness of the solution, and then proceed to notify the whole project team about the results via email.

  27. How many closing verifications are included in the service?

    The service offers unlimited closing verifications.

  28. Why do I need to notify the remediation of a vulnerability if FLUIDAttacks

    has access to the source code repositories?

    One of the objectives of the Continuous Hacking service alongside Integrates is to maintain a clear and fluent communication between all parties involved in the project. When the client notifies the remediation of a vulnerability, he is not only notifying FLUIDAttacks but the whole project team.

  29. What happens if I consider something is not a vulnerability?

    Within Integrates we have a forum-like comments section where the client can let FLUIDAttacks know the reasons for which they consider a finding is not a vulnerability. In this section, FLUIDAttacks and all other project members can establish a conversation regarding the vulnerability and determine the validity of a vulnerability.

  30. Do all reported vulnerabilities have to be remediated?

    The remediation of a vulnerability is a decision left to the client’s discretion. In Integrates, there is a treatment option where it is defined if a vulnerability is going to be remediated or assumed by the client.

  31. If a vulnerability is assumed by the client, is it excluded from the reports

    and Integrates?

    The reports contain information regarding the treatment given to a vulnerability. With this in mind, all assumed vulnerabilities remain in the reports with the clarification of the treatment received.

  32. If the application is stored along multiple repositories, can they all be


    It is possible to verify and test multiple repositories with the only condition that the code is stored on the same branch in each repository. If it is established that all test will be performed on the QA branch, this same branch must be present in all repositories included in the service.

  33. If I have code that was developed a long time ago, is it possible to still

    hire the service?

    Yes, it is possible. There are two options in this scenario:

    1. A Health Check is performed in which all existing code is tested. Following this, the service is executed normally with the defined scope (see question 11). This option is better suited for applications that are being developed.

    2. Start the subscription with the standard limits(see question 10) where we will increase the coverage on a monthly basis until 100% is reached. This option is better suited for applications that are not in constant development.

  34. Do the repositories need to be in a specific version control system?

    The Continuous Hacking service is based on developments that use GIT for version control. This makes the use of this system necessary for the service.

  35. Does FLUIDAttacks keep or store information regarding the vulnerabilities


    The information is only kept for the duration of the service. Once the service has ended, the information is kept for 7 business days after which all information is deleted from all of FLUIDAttacks information systems.

  36. Does the Continuous Hacking service require any development methodology?

    No. The Continuous Hacking service is independent from the client’s development methodology. The results of the service then become an input in the planning of future development cycles and do not prevent the continuation of the development.

  37. Does FLUIDAttacks make demonstrations in teleconference periodically?

    What is the procedure to program it?

    Yes, we make demonstrations frequently. For this purpose you should only indicate the emails of the attendees and 3 hour options of 1 hour duration, with this we will send the invitation in the hours of our convenience.

Service status - Terms of Use