Skip to content

Glossary

  • Pentest: A penetration test run with configuration, timing, and reporting.
  • Engagement: A single pentest instance for a specific target.
  • Active Pentest: The live view of ongoing testing activity.
  • Consent: Approval required before testing starts.
  • Scope permissions: Per-URL permissions defining allowed actions (access vs exploitation).
  • Access: Allowed interaction that avoids exploitation.
  • Exploitation: Explicit permission to attempt exploitation steps.
  • Scope discovery: Automatic discovery of additional URLs in scope.
  • Roles/credentials: Accounts or verification links enabling authenticated testing.
  • Finding: A security issue with severity, status, and history.
  • Evidence: Proof of the issue, such as requests, responses, or screenshots.
  • Mitigation: Guidance for resolving the issue.
  • Endpoints: Affected URLs and methods tied to a finding.
  • Risk level: Severity assigned to a finding (informational to critical).
  • New: Initial status for a finding.
  • Accepted: User-confirmed finding for remediation.
  • Fixed: User-confirmed remediation, ready for verification.
  • Rejected: User-marked invalid or not applicable.
  • AI accepted / AI rejected / AI fixed: System-assigned statuses from automated verification.
  • Retest: A follow-up validation that a finding is resolved.
  • Retest log: Live messages shown while a retest is running.
  • Remediation: The page where you review findings, update status, and run retests.
  • Status reason: Required explanation when changing finding status.
  • Show irrelevant: Toggle to include informational, merged, or AI-rejected items.
  • Informational: Low-risk findings that are unlikely to require remediation.
  • AI rejected: A system status for findings the AI deemed invalid.
  • Report type: Selected report output (Executive, Audit, Technical, Full).
  • Report levels: Preset detail levels (Executive, Audit, Technical, Full).
  • Human needed: State where user input is required to continue.