Skip to main content

Vulnerability Verification

info

The English user guide is currently in beta preview. Most of the documents have been automatically translated from the Japanese version. Should you find any inaccuracies, please reach out to Flatt Security.

Overview

Vulnerability Verification automatically verifies whether a reported vulnerability can actually be reproduced.

It executes attack scenarios against the target application and determines whether the vulnerability exists. This can be used not only for re-testing after a fix, but also for validating the legitimacy of vulnerability reports from various sources such as bug bounties or third-party audits.

Creating a Verification Task

There are two ways to create a vulnerability verification task.

From a Takumi Assessment Result

To re-verify a vulnerability detected in a previous blackbox assessment, you can create a task directly from the assessment report page.

  1. Open the report page of a completed blackbox assessment.
  2. Click the "Verify Vulnerability" button.
  3. Select the vulnerability you want to verify, then click "Start Verification".

Select Finding to Verify modal

info

You cannot create duplicate tasks for the same vulnerability. To re-verify, delete the existing task first and then create a new one.

Create Manually

You can also verify vulnerabilities discovered outside of Takumi assessments, such as those from bug bounties or third-party vulnerability reports.

  1. Open the Vulnerability Verification list page from the tab.
  2. Click the "Create Task" button.
  3. Fill in the following information:
    • Title: Name of the vulnerability (e.g., SQL Injection in login form)
    • Vulnerability Report: Detailed description of the vulnerability. Include reproduction steps, affected endpoints, and impact
    • Vulnerability Type: Classification such as XSS, SQL Injection, etc. (optional)
    • Target URL: URL of the application to verify
    • Credentials: Enter if the target application requires authentication (optional)
  4. Click "Start Verification".
info

The more detailed the vulnerability report, the more accurate the verification will be. Including reproduction steps and specific request examples is recommended.

Reviewing the Result

Processing typically takes several minutes. Select the target task from the list to open its detail panel with the verification result.

Vulnerability Verification result panel

Task Operations

The following operations are available from each task's action menu:

  • Retry: Re-run the verification with the same conditions. Use this after redeploying a fix or to retry after an error.
  • Cancel: Stop a running verification.
  • Delete: Remove the task from the list.

Statuses and Results

CategoryItemDescription
ProgressRunningVerification is in progress.
CancelledExecution was stopped by the user.
ResultNot VulnerableThe vulnerability could not be reproduced.
VulnerableThe vulnerability was reproduced.
Waiting ReviewAn error occurred during processing, or the result could not be determined automatically.

Important Notes

  • Verdict accuracy: Verdicts are produced automatically, so results may vary depending on network conditions or application state. For critical issues, review the reasoning and perform a manual final check as needed.
  • One finding per task: Each task verifies a single vulnerability. To verify multiple vulnerabilities, create one task per finding.

Credit Consumption

Credits are required to use this feature. Credit consumption varies depending on the vulnerability under verification and the complexity of the operations needed to reproduce it.