Tracking Vulnerabilities
PAIStrike automatically discovers and tracks vulnerabilities found during test jobs. Findings are centralized across your project, making it easy to prioritize remediation and monitor progress.
Severity Levels
Every vulnerability is assigned a severity level based on its potential impact:
| Severity | Color | Description | Typical Remediation Timeframe |
|---|---|---|---|
| Critical | Red | Immediate exploitation risk; complete system compromise possible | 24–48 hours |
| High | Orange | Significant risk; could lead to data breach or unauthorized access | 1 week |
| Medium | Yellow | Moderate risk; exploitable under certain conditions | 1 month |
| Low | Blue | Minor risk; limited impact | 3 months |
| Info | Gray | Informational only; no immediate exploitation risk | As needed |
These timeframes are guidelines. Your organization's security policy may define different SLAs.
Viewing Vulnerabilities
Project-Level View
To see all findings across an entire project:
- Open the project.
- Click the Vulnerabilities tab.
- All findings from all assets and jobs within the project are listed here.
Asset-Level View
To see findings for a specific asset:
- Open the project.
- Click on an asset.
- Click the Vulnerabilities tab on the asset detail page.
Job-Level View
To see findings from a specific test execution:
- Open the job.
- Findings are listed directly on the job results page.
Vulnerability Detail
Click any vulnerability to view its full detail:
- Title — a concise name for the vulnerability (e.g., "Reflected XSS in Search Parameter")
- Severity — the assigned severity level
- Asset — which asset this was found on
- Discovered — timestamp of when the AI found it
- Description — explanation of the vulnerability, including what it is and why it matters
- Steps to Reproduce — a step-by-step guide for manually confirming the issue
- Evidence — screenshots, HTTP request/response payloads, or other proof of exploitability
- Remediation — recommended steps to fix the issue
- References — links to CVEs, CWEs, or relevant security advisories
Filtering and Sorting
Use the filter bar at the top of the vulnerabilities list to narrow results:
- By severity: Show only Critical, High, Medium, Low, or Info findings
- By status: Filter by Open, In Progress, Resolved, or Accepted Risk
- By asset: Scope findings to a specific asset
- By job: View findings from a specific test run
- By date: Filter by discovery date range
Sort the list by severity, discovery date, asset name, or status.
Vulnerability Statuses
Track the remediation lifecycle of each finding:
| Status | Meaning |
|---|---|
| Open | Newly discovered; no remediation action taken |
| In Progress | Remediation work has started |
| Resolved | Fix has been applied (pending verification via retest) |
| Accepted Risk | Organization has decided to accept this risk without fixing it |
To update a vulnerability's status:
- Open the vulnerability.
- Click the Status dropdown.
- Select the new status.
- Optionally add a note explaining the decision.
- Click Save.
Exporting Vulnerability Data
Vulnerability data is included in generated reports. See Generating a Report for details on exporting findings as a structured PDF document.