Overview
The Reports section allows security teams to generate, manage, and export structured reports of their external attack surface. Reports consolidate data from scans, assets, and risk signals into executive-ready and audit-friendly documents, enabling better visibility, decision-making, and compliance tracking.
Report Types
The platform supports multiple report formats tailored for different use cases:Executive Report
High-level PDF report summarizing assets, exposures, and risk posture for leadership and stakeholders.
Exposure Report
Detailed breakdown of all detected exposures and vulnerabilities in structured format.
Attack Surface Report
Complete inventory of all discovered external assets across your organization.
Generating Reports
To generate a report:- Select the desired report type
- Click Generate
- The system compiles data from scans and exposures
- Report appears in Report History
Report History

Fields Explained
| Field | Description |
|---|---|
| Name | Report title with timestamp |
| Created At | When the report was generated |
| Generation Initiated By | User who triggered the report |
| Status | Current state (Completed / Failed) |
Report Status
- ๐ข Completed โ Report is ready for download
- ๐ด Failed โ Report generation failed
- ๐ก (Processing) โ Report is being generated (if applicable)
Report Actions

- โฌ๏ธ Download Report โ Export the report file
- ๐๏ธ Delete Report โ Remove unnecessary reports
How Reports Are Built
Reports aggregate data from multiple ASM components:- Scans โ Asset discovery results
- Assets โ Subdomains, IPs, services
- Exposures โ Detected risks and misconfigurations
- Risk Signals โ Correlated findings and severity
Workflow Example
- Run or complete a scan
- Navigate to Reports
- Generate an Executive or Exposure report
- Wait for processing to complete
- Download and share with stakeholders
Benefits
- โ Centralized reporting for all ASM data
- โ Executive-ready summaries
- โ Easy export for compliance and audits
- โ Full audit trail of generated reports
- โ Quick access to historical reports
Best Practices
- ๐ Generate reports after each major scan
- ๐ Use Executive Reports for leadership
- ๐ Use Exposure Reports for technical teams
- ๐งน Clean up failed or duplicate reports regularly
From Data to Decisions
Scan โ Detect โ Analyze โ Report โ Act Reports transform raw attack surface data into actionable insights for both technical and non-technical stakeholders.Explore Live Demo
Explore ASM Live โ No Signup Needed
Instantly explore how Snapsec Attack Surface Management (ASM) detects exposures, correlates signals, and enables real-time security decisions โ all in one unified platform.