Skip to main content

Vulnerability Management

The web dashboard provides a powerful Kanban-style interface for managing vulnerabilities across all your projects. Track findings from discovery through resolution with full team visibility.

The Kanban Board

Visualize and manage your security workflow with drag-and-drop simplicity.
Vulnerability Kanban board

Workflow Columns

ColumnPurposeAction Items
Awaiting VerificationPotential issues being analyzedWait for Kai to verify
Awaiting ApprovalVerified vulnerabilities ready for reviewReview and triage
To Be FixedApproved issues ready for remediationAssign and schedule
FixedResolved vulnerabilitiesVerify and close
Won’t DoAccepted risks or false positivesDocument rationale

Working with the Kanban

Drag and drop vulnerability cards between columns to update their status. Watch the walkthrough below:

Filtering & Sorting

Quickly find the vulnerabilities you need: Filter by:
  • Severity (Critical, High, Medium, Low)
  • Repository or project
  • Assigned team member
  • Date range
Sort by:
  • Severity (highest first)
  • Date discovered
  • Date modified
  • Assigned member

Bulk Operations

Select multiple vulnerabilities to:
  • Move to a different column
  • Assign to a team member
  • Apply labels or tags
  • Export for reporting

Vulnerability Details

Click any vulnerability card to view:
  • Full Report: Complete vulnerability description and impact
  • Exploit Code: Working proof-of-concept
  • Suggested Fix: Code changes to resolve the issue
  • History: All status changes and comments
  • Related Findings: Similar issues in your codebase

Workflow Best Practices

Daily Security Standup

  1. Review the Awaiting Approval column
  2. Triage new findings by severity
  3. Assign ownership for “To Be Fixed” items
  4. Celebrate items moved to “Fixed”

Weekly Review

  1. Audit Won’t Do decisions
  2. Check for stale items in any column
  3. Review team workload distribution
  4. Plan remediation priorities for the week

Integration with Development

Connect vulnerability management to your development workflow:
  • Jira integration (coming soon): Link findings directly to Jira tickets
  • GitHub integration (coming soon): Create issues from vulnerabilities
  • Export options: CSV, JSON, PDF for external tracking systems

Exporting Data

Export vulnerability data for:
  • Compliance reporting
  • Executive summaries
  • Security audit documentation
  • Team performance reviews
Supported formats: CSV, JSON, PDF reports

Next Steps