Skip to main content

Documentation Index

Fetch the complete documentation index at: https://docs.snapsec.co/llms.txt

Use this file to discover all available pages before exploring further.

Overview

The Archived Vulnerabilities section is used to store vulnerabilities that are no longer actively tracked but are preserved for:
  • Historical reference
  • Audit and compliance
  • Long-term record keeping
These vulnerabilities are removed from active workflows but remain accessible when needed.

Archived Vulnerabilities List

What You See

  • Vulnerability title
  • Archived by (user/system)
  • Owner
  • Assessment
  • Current state
  • Severity

Filters & Controls

Available Filters

  • Severity
  • State
This helps in:
  • Reviewing past issues
  • Auditing archived findings
  • Searching historical vulnerabilities

Unarchive Vulnerability

You can restore an archived vulnerability back into the workflow.

How It Works

  • Click the three-dot menu (⋯)
  • Select Unarchive
This moves the vulnerability back to: ➡️ Active or Closed state (based on last status)

Archived Vulnerability Details

Includes

  • Full vulnerability report
  • Severity and CWE mapping
  • Category classification
  • Steps to reproduce
  • Impact analysis

Metadata & Context

Available Fields

  • Owner
  • State
  • Assessment
  • Affected asset
  • CWE
  • Reported date
  • Business unit
  • SLA status

Activity Timeline

Archived vulnerabilities retain full history:
  • Comments and discussions
  • Status transitions
  • Ownership updates
This ensures:
  • Complete traceability
  • Audit readiness
  • Historical accountability

Attachments

All supporting files remain accessible:
  • Screenshots
  • Logs
  • Evidence files

When to Archive

Archive vulnerabilities when:
  • They are no longer relevant
  • They are superseded by newer findings
  • They are retained only for compliance
  • They clutter active workflows

Why It Matters

Archiving helps:
  • Reduce noise in active dashboards
  • Keep workflows focused
  • Maintain clean vulnerability pipelines
  • Preserve long-term security history

Key Benefits

  • Clean and organized vulnerability management
  • Full audit trail retention
  • Easy restoration when needed
  • Improved operational clarity

Where It Fits

Archived Vulnerabilities completes the lifecycle:
  • Active → Closed → Archived
And integrates with:
  • Reports & Compliance
  • SLA Tracking
  • Risk Acceptance
  • Audit Logs

Explore Live Demo

Manage Archived Vulnerabilities

Keep your vulnerability lifecycle clean while preserving full historical context.