Skip to main content

Documentation Index

Fetch the complete documentation index at: https://docs.snapsec.co/llms.txt

Use this file to discover all available pages before exploring further.

Overview

The Active Vulnerabilities section provides a real-time view of all open security findings across your organization. It is the primary workspace for:
  • Triage and prioritization
  • Assignment and ownership
  • Tracking remediation progress
  • Managing vulnerability lifecycle

Vulnerability Dashboard

Key Metrics

  • In Review → Newly identified findings awaiting triage
  • Triaged → Reviewed and categorized
  • Duplicate → Repeated findings grouped
  • Retest → Awaiting verification after fix
  • Fixed in Staging → Patched but not yet verified
  • Resolved → Successfully remediated
  • Risk Accepted → Accepted by business
  • Unresolved → Still open
  • False Positive → Invalid findings
  • Not Applicable → Out of scope

Available Filters

  • State
  • Severity
  • Assessment
  • Assignee
  • Category
  • CWE
  • Team
This enables teams to quickly:
  • Focus on critical issues
  • View team-specific vulnerabilities
  • Filter by compliance or category

Create Vulnerability

Use this when adding findings from:
  • Manual testing
  • External reports
  • Bug bounty submissions

Required Fields

  • Vulnerability Title
  • Assessment Selection

Vulnerability Details View

Report Includes

  • CWE mapping
  • Category classification
  • Detailed description
  • Steps to reproduce
  • Impact analysis
  • References (OWASP, CWE, etc.)

Metadata & Ownership

Fields Available

  • Owner → Assigned individual
  • State → Current lifecycle stage
  • Assessment → Linked assessment
  • Collaborators → Supporting users
  • Affected Asset → Impacted system
  • CWE Mapping → Standard classification
  • Reported Date
  • Business Unit
  • SLA Status

Collaboration & Activity

Each vulnerability includes:
  • Comments panel → Team discussion
  • Blockers → Identify dependencies
  • Activity timeline → Full audit trail
This ensures complete visibility into:
  • Who changed what
  • When actions were taken
  • Progress toward remediation

Attachments

Upload supporting evidence:
  • Screenshots
  • Request/response logs
  • Exploit proof

Why This Matters

This is where vulnerability management becomes operational.

Key Benefits

  • Centralized vulnerability lifecycle management
  • Faster triage and prioritization
  • Clear ownership and accountability
  • Full audit trail for compliance
  • Improved remediation tracking

Where It Fits

Active Vulnerabilities connects with:
  • Assessments → Source of findings
  • Detection Rules → How issues are identified
  • Vulnerability Sources → Confidence & accuracy
  • SLA Module → Remediation timelines
  • Reports → Executive visibility

Explore Live Demo

Manage Vulnerabilities End-to-End

Track, triage, and resolve vulnerabilities efficiently across your organization.