Documentation Index
Fetch the complete documentation index at: https://docs.snapsec.co/llms.txt
Use this file to discover all available pages before exploring further.
Overview
The Closed Vulnerabilities section provides visibility into completed vulnerability lifecycle states. This includes:- Successfully resolved issues
- Risk-accepted vulnerabilities
- False positives
- Non-applicable findings
Closed Vulnerability Dashboard

Key Metrics
- Resolved → Fully remediated vulnerabilities
- Risk Accepted → Accepted by business decision
- False Positive → Invalid findings dismissed
- Not Applicable → Out-of-scope or irrelevant
- Retest → Pending verification
- Fixed in Staging → Awaiting confirmation
Filtering & Search

Filters Available
- State
- Severity
- Assessment
- Assignee
- Category
- CWE
- Team
- Reviewing historical fixes
- Validating remediation trends
- Auditing team performance
Create Vulnerability

- Already resolved externally
- Imported from legacy systems
- Reported post-fix
Closed Vulnerability Details

Report Includes
- CWE classification
- Category mapping
- Full vulnerability description
- Steps to reproduce
- Impact analysis
- References
Metadata & Status Tracking

Available Fields
- Owner
- State (Resolved / Retest / Accepted)
- Assessment
- Affected Asset
- CWE Mapping
- Reported Date
- Business Unit
- SLA Status
Activity Timeline & Audit Trail
Each closed vulnerability maintains a complete history:- State transitions
- Ownership changes
- Comments and discussions
- Validation updates
- Full compliance tracking
- Transparent remediation history
- Easy audit readiness
Attachments
Store proof of remediation:- Fix validation screenshots
- Logs and evidence
- Security reports
Why This Matters
Closed vulnerabilities are not just “done issues” — they are your:- Proof of security maturity
- Audit evidence for compliance
- Source of remediation insights
Key Benefits
- Complete historical tracking
- Audit-ready documentation
- Visibility into remediation efficiency
- Reduced duplication of issues
- Stronger compliance posture
Where It Fits
Closed Vulnerabilities connects with:- Active Vulnerabilities → Lifecycle transition
- Assessments → Source of findings
- SLA Module → Resolution timelines
- Reports → Executive summaries
- Risk Acceptance → Business decisions
Explore Live Demo
Review and Audit Closed Vulnerabilities
Validate fixes, track history, and maintain compliance across your organization.