Vulnerabilities Dashboard

The Vulnerabilities Dashboard is a singular view of application security quality metrics, including a list of vulnerabilities based on static/runtime analysis of applications. Engineering and SecOps teams can use these metrics to measure the progress of their security improvement over time.

The Vulnerabilities Dashboard offers four types of information:

In addition, the Vulnerabilities Dashboard provides a list of vulnerabilities that can be filtered and sorted on multiple criteria including severity, type and location vulnerabilities, number of security events, and number of blocked attempts to exploit the vulnerability. Filters can also be saved and reused, and as the basis for a default view or a build rule.

You access the Vulnerabilities Dashboard from the Application List. Clicking Vulnerabilities displays the Vulnerabilities Dashboard with a list of vulnerabilities for all your applications.

Click Vulnerabilities from Application List

To see a specific application's vulnerabilities, click on the card of the application of interest from Your Applications view.

Your Applications

Progressive Build Quality

Progressive build (security) quality is measured by the number of vulnerabilities fixed in the nth build vs n-1 build. In general, one could perform custom comparisons between any two builds. This helps measure progress (or decline) of security quality between releases.

Vulnerabilities - Release Trend

Security Regression Testing

ShiftLeft reports the number of new vulnerabilities and reintroduced vulnerabilities in the latest build, so that engineering leaders can measure how many security issues escaped regression testing.

Security Regression Testing

Runtime Observed Vulnerabilities

The Vulnerabilities Dashboard reports the number of vulnerabilities that have associated runtime traffic events in QA test or production. This measure can help developers prioritize vulnerabilities, and to use the criticality of the vulnerabilities. Reduction in the number of runtime observed vulnerabilities was highly correlated with reduction in number of app exploit attempts over time.

Vulnerability Listing

Vulnerability Characteristics

From the vulnerabilities list, click on a vulnerability of interest to see information on the following characteristics:

  • trigger method

  • file location

  • input variable

  • number of times vulnerability was observed in runtime

  • recommended countermeasure

  • data flow associated with the vulnerability

Vulnerability example

Developers and Application security teams can use this information to take action on a particular vulnerability.

Event Details

You can view details on a sampling of security events for a vulnerability, by clicking on Events Summary from the Vulnerability Info view.

Events Summary

Displays a maximum of 50 evenly distributed event samples, collected from when the vulnerability was first identified. Details are provided on an event's headers, payloads, request origin, and whether the event was blocked by ShiftLeft Protect. Such information can help you in remediation, to make precise code fixes and to determine the extent of an attack.

Events Viewer

Note that by default the Event Viewer only displays an event count summary. In order to include the full payloads of attack events, you must turn on the CLI Flag User opt-in is required because collected event information collected potentially sensitive, and consumes more network resources to transmit that data to the ShiftLeft infrastructure.