
Exposure Overview
Overview
Exposures represent validated risks automatically derived from your discovered assets.Each entry contains:
- Asset & Type – The resource impacted (e.g., IP, Subdomain, Certificate)
- Reason – Why this asset was flagged (e.g., “Invalid SSL Cert”)
- Severity – Criticality defined by your exposure rules or manual review
- State – Workflow state (In Review, Safe, Resolved, Not assigned)
- Detected At – Timestamp of when the exposure was first observed
- Action – View, edit, or mark exposure as safe
Key Capabilities
Automatic Exposure Generation
All exposures are created automatically by your YAML-based rules during scans.
Rules define which assets are risky and assign their severity and description.
Rules define which assets are risky and assign their severity and description.
Detailed Exposure Listing
View all exposures in a structured table with filters by asset type, state, and severity.
Modify & Review
Analysts can manually edit the reason or change severity to refine classification accuracy.
Mark as Safe
False positives can be marked as Safe to prevent recurrence in future scans.
Editing Exposures
You can edit any exposure directly to adjust severity or reason text.
Editing an Exposure
Example Use
- Adjust Severity from Critical → Medium when risk context is low.
- Update Reason to add notes like “Reviewed internally – no sensitive data.”