Reviewing Test Results

Review the results of security testing of your application and included third-party and open-source components, and handle the detected vulnerabilities.

Run your existing automatic Selenium or unit tests, or manual tests to generate traffic in your application and enable Seeker to monitor it for vulnerabilities.

Tasks Information
Review and explore the detected vulnerabilities. Working with Vulnerabilities
Review the metrics of vulnerability detections in each of your applications and the third-party components they include, as well as the application's compliance with the assigned policy and the major security standards. View Application Security for Regular Projects

View Compliance Status

Review the detailed results of Software Composition Analysis (SCA) that scans for vulnerabilities the third-party and open-source components used in your application. View Component Risk
Generate a summary application security report by using the Export PDF option. You can also use the /api/{ver}/reports/export API to fine-tune the report content by filters. Export Vulnerabilities

Using APIs