Fluid Attacks News logo

News

Subscribe to Updates

Labels

  • All Posts
  • Fix
  • Announcement
  • Improvement
  • new

Jump to Month

  • April 2025
  • March 2025
  • February 2025
  • January 2025
  • December 2024
  • November 2024
  • October 2024
  • September 2024
  • August 2024
  • July 2024
  • June 2024
  • May 2024
  • April 2024
  • March 2024
  • February 2024
  • January 2024
  • December 2023
  • November 2023
  • October 2023
  • September 2023
  • August 2023
  • July 2023
  • June 2023
  • May 2023
  • April 2023
  • March 2023
  • February 2023
  • January 2023
  • December 2022
  • November 2022
  • October 2022
  • September 2022
  • August 2022
  • July 2022
  • June 2022
  • May 2022
  • April 2022
  • March 2022
  • February 2022
  • January 2022
  • December 2021
  • November 2021
  • October 2021
  • September 2021
  • August 2021
  • July 2021
  • June 2021
  • May 2021
  • April 2021
  • March 2021
  • February 2021
  • January 2021
  • December 2020
  • November 2020
  • October 2020
  • September 2020
  • August 2020
  • July 2020
  • June 2020
  • May 2020
  • April 2020
  • March 2020
  • February 2020
  • January 2020
  • December 2019
  • November 2019
  • October 2019
  • September 2019
  • July 2019
Product Roadmap
In Review
VEX Support
new
In Progress
Azure integration
new
Container images analysis
new
PHP SAST Suppport
new
Platform redesign
new
CVSS 4.0 in our platform
new
new
4 years ago

DevSecOps Agent Token

Security and UX don't always go hand in hand, but it is one of our main goals to keep it together as possible.

A few days ago, we deployed a new DevSecOps agent version that improves its predecessor's stability, performance and usability. This new version comes with some changes to how the agent is going used.

Now, in our ARM scope section (Organization>Groups>GroupName>Scope), you will find DevSecOps Agent Token section. 

Where you can copy required token to execute DevSecOps Agent.

Only group managers could view and copy the token, so if you need to get the token, please contact them.

All features are the product of a team effort. You can be part of it and contribute by leaving your comments here in this post or sending them to help@fluidattacks.com.

Avatar of authorJuan
Improvement
4 years ago

Vulnerabilities Treatment Edition

Manage vulnerabilities could be confusing and complicated. Our team is committed to easing our customer's processes.

Simplifying treatment management, we add a new tab to the vulnerability details menu, in which you can change vulnerability treatment, define tags, or custom criticality level.

All features are the product of a team effort. You can be part of it and contribute by leaving your comments here in this post or sending them to help@fluidattacks.com.

Avatar of authorJuan
Improvement
4 years ago

Tracking View

Knowing what happened and when with our vulnerabilities is essential to manage the team's efforts.

You can check whether a vulnerability was discovered, accepted, or closed in the new tracking view.

With this information, you can follow the history of vulnerabilities related to specific findings.

All features are the product of a team effort. You can be part of it and contribute by leaving your comments here in this post or sending them to help@fluidattacks.com.



Avatar of authorJuan
Fix
4 years ago

About Login Issues 2021-01-28


What happened

  • Due to a session management change (https://gitlab.com/fluidattacks/product/-/commit/1f67cd266283a8846ab8fc84ed761a3b89d2ff33) user cookies were deleted for current session.

  • If a user sign-in with an existent session all cookies are deleted and an unauthorized error is propagated through all user sessions. The bug was injected on 2021/01/27 14:31 (EST).

What we’ve done

  • Now the cookies are not deleted, only a notification about concurrent sessions. (https://gitlab.com/fluidattacks/product/-/commit/b8600cc80d0b4fd5142a02c7f0d71b564f68bb25)

What the impact was

  • Users who tried to log in with existent sessions get unauthorized error.

What we are doing to help

  • Check all user sessions to confirm if any user is affected. 
Avatar of authorJuan
new
4 years ago

Vulnerabilities Info

Data is the essence of any organization, and more if that data could help you prevent a security incident.

With more data more effective are the efforts to solve a vulnerability. This is why we add new vulnerability info modal to give all data about reported vulnerabilities.

You can click on the vulnerability that you want more information about in the locations table.

If you think that you need more information, let us know, and we will give you.

All features are the product of a team effort. You can be part of it and contribute by leaving your comments here in this post or sending them to help@fluidattacks.com.

Avatar of authorJuan
new
4 years ago

Finding age

Know when a finding was reported is essential as to know if a new vulnerability reopened that finding.

You can find three dates to know all about your finding report dates:

  • Age(days): Days since the first vulnerability was reported to your group.
  • Open Age(days): Days since the first open vulnerability was reported to your group.
  • Last report (days): Days since the last vulnerability was reported to your group.

All features are the product of a team effort. You can be part of it and contribute by leaving your comments here in this post or sending them to help@fluidattacks.com.

Avatar of authorJuan
new
4 years ago

Analytics new graphs

Have the information to make decisions is essential to us, and we know that for you are important too.

We add new graphs to help to understand your vulnerabilities and all your group data. Now you will find these graphics:

  • Vulnerabilities over time in portfolios view
  • How many vulnerabilities by tag
  • How many vulnerabilities by tag
  • Vulnerabilities by treatments
  • Vulnerabilities by reattacks
  • Vulnerabilities by type
  • Total vulnerabilities in portfolios view
  • Accepted vulnerabilities by severity
  • Top 10 Oldest vulnerabilities
  • Top findings (by # vulnerabilities)
  •  Accepted vulnerabilities by user
  • Meantime to remediate for non-treated vulnerabilities

If you have any doubts with these or other metrics do not hesitate to contact us.

All features are the product of a team effort. You can be part of it and contribute by leaving your comments here in this post or sending them to help@fluidattacks.com.

Avatar of authorJuan
Improvement
4 years ago

Exclude code from analysis

Even though we believe all code versioned in repository must be analyzed, some times and for any reasons a piece of source code is not needed to be analyzed.

This is why we enable gitignore option to exclude any piece of source code from analyzed repositories.

You will find this option in new/edit roots modal.

Remember follow gitignore pattern to document the exclusions.

All features are the product of a team effort. You can be part of it and contribute by leaving your comments here in this post or sending them to help@fluidattacks.com.


Avatar of authorJuan
Improvement
4 years ago

Vulnerabilities Table

Now the vulnerabilities table is more descriptive.

You can filter, add, or remove columns and get all information about vulnerabilities in your group.

All features are the product of a team effort. You can be part of it and contribute by leaving your comments here in this post or sending them to help@fluidattacks.com.

Avatar of authorJuan
new
4 years ago

Environments in Git Roots

We give more relevance to the most important thing in any app, the source code. Now environments are included in Git Roots.

All source code needs to be deployed in an environment; this is why you need to select a Git Root as the origin of the code deployed in a specific environment.

If you want to add or edit an environment, you need to select the git root associated with the URL.

Add the desired URL, and that's it.


Avatar of authorJuan