Reviewing Test Results
Review the results of security testing of your application and included third-party and open-source components, and handle the detected vulnerabilities.
Run your existing automatic Selenium or unit tests, or manual tests to generate traffic in your application and enable Seeker to monitor it for vulnerabilities.
Tasks | Information |
---|---|
Review and explore the detected vulnerabilities. | Working with Vulnerabilities |
Review the metrics of vulnerability detections in each of your applications and the third-party components they include, as well as the application's compliance with the assigned policy and the major security standards. | View Application Security for Regular Projects |
Review the detailed results of Software Composition Analysis (SCA) that scans for vulnerabilities the third-party and open-source components used in your application. | View Component Risk |
Generate a summary application security report by using the Export PDF option. You can also use the /api/{ver}/reports/export API to fine-tune the report content by filters. | Export Vulnerabilities |