Vulnerability Details
Overview
Managing and Reviewing Vulnerability Details
What is the Vulnerabilities Details Section?
The Vulnerabilities Details section provides essential actions for managing, tracking, and responding to identified security risks in APIs. It allows security teams to analyze findings, manage false positives, log security issues, and export vulnerability details for further investigation or remediation.
Effective vulnerability management ensures that security risks are properly assessed, categorized, and either mitigated, documented, or marked for review.
Key Actions Available in the Vulnerabilities Details Section
- When a vulnerability is identified but deemed acceptable based on risk assessment, it can be marked as an accepted risk.
- This is useful for cases where fixing the vulnerability is not feasible or poses minimal security impact.
- If a vulnerability is incorrectly flagged, it can be marked as a false positive to prevent unnecessary remediation efforts.
- Helps improve accuracy by distinguishing real threats from benign findings.
- Security teams can create a tracking ticket directly from the vulnerability details page.
- This ensures vulnerabilities are logged in issue-tracking systems such as Jira, GitHub Issues, or other ticketing platforms.
- Useful for assigning remediation tasks to developers and tracking resolution progress.
- Allows users to generate a cURL command that reproduces the API request associated with the vulnerability.
- Helps developers and security analysts test and validate the issue efficiently.
- Enables exporting of detailed vulnerability logs for further analysis, audit purposes, or reporting.
- Helps security teams document findings and maintain records for compliance.
📖 Accept Vulnerability Risk
---
📖 Marking False Positive
---
📖 Create Ticket
---
📖 Export as Curl
---
📖 Export Logs
---
Why is This Important?
- Ensures vulnerabilities are properly classified and managed within security workflows.
- Helps reduce false positives, ensuring only valid security threats are prioritized.
- Provides a structured approach to tracking, logging, and resolving security issues efficiently.
- Facilitates collaboration between security and development teams for faster remediation.
By leveraging these tools, organizations can maintain better visibility, tracking, and control over API security risks.