Skip to main content

WAS Dashboard Overview


Overview

The WAS Dashboard aggregates data from:
  • API request analysis
  • Automated security scans
  • Rule-based vulnerability detections
  • Endpoint discovery
It presents the overall security posture across:
  • Total Endpoints
  • Total Vulnerabilities
  • Total Rules Active
  • Total Scans Executed
This allows teams to track detection quality, exposure trends, and rule effectiveness.

Key Metrics & Analytics

Total Endpoints

Number of API endpoints discovered and analyzed.

Total Vulnerabilities

Total number of vulnerabilities detected across all API endpoints.

Total Rules

Count of rule checks currently active for detection.

Total Scans

Total number of scans executed in the workspace.

Vulnerability Severity Distribution

Severity Distribution Chart

Displays vulnerability distribution across:
  • Critical
  • High
  • Medium
  • Low
  • Informational
This helps security teams estimate the immediate remediation workload.

CWE Distribution

CWE Classification Chart

Shows how vulnerabilities group under standardized CWE categories (e.g., CWE-284: Improper Access Control), helping teams understand recurring weakness patterns.

Open/Closed Vulnerabilities

Open vs Closed Vulnerabilities

Helps track remediation progress and backlog by showing:
  • Active vulnerabilities
  • Resolved vulnerabilities

Top Vulnerabilities

Top Vulnerabilities Table

Highlights:
  • Most frequent vulnerabilities
  • Affected endpoints
  • Severity
  • Detection timestamps
This prioritizes what needs immediate attention. Columns include:
  • Title
  • State
  • Severity
  • First Detected
  • Reported On

How to Use the Dashboard

Track Security Posture

Monitor trends across vulnerabilities, endpoints, severity, and detection rules.

Identify High-Risk Endpoints

Quickly detect endpoints repeatedly affected by access control or logic flaws.

Validate Detection Rules

Ensure rules are triggering correctly across environments and projects.

Improve Scan Efficiency

Use scan frequency and vulnerability density metrics to adjust scan profiles.

Next Steps

View Vulnerabilities

Explore detailed vulnerability data, affected endpoints, and remediation steps.