Overview
Vulnerability tracking is central to Faction’s workflow. This guide covers adding vulnerabilities to assessments, using templates, creating custom findings, and managing vulnerability lifecycle from discovery to remediation.Understanding Vulnerability Components
Each vulnerability in Faction consists of several key components:- Name: Short title identifying the vulnerability
- Description: Detailed explanation of the security issue
- Recommendation: Remediation guidance for developers
- Details: Specific exploit information, steps to reproduce
- Category: OWASP Top 10, CWE, or custom categorization
- Risk Rating: Likelihood, Impact, and Overall risk scores
- CVSS Scoring: CVSS 3.1 or CVSS 4.0 vectors and scores (if enabled)
- Tracking ID: Unique identifier for remediation (format:
VID-XXXX) - Custom Fields: Additional metadata specific to your workflow
Adding Vulnerabilities to an Assessment
Navigate to Assessment
Open the assessment from your queue or dashboard where you want to add findings.
Choose a Template or Create Custom
You have two options:
Use a Vulnerability Template
Faction includes 75+ pre-populated vulnerability templates covering:- OWASP Top 10 vulnerabilities
- Common web application flaws
- API security issues
- Mobile application vulnerabilities
- Infrastructure weaknesses
- Pre-written descriptions
- Standard remediation advice
- Default risk ratings
- Category assignments
- Reference links (CWE, OWASP)
Create a Custom Vulnerability
For unique findings not covered by templates:- Select Create Custom
- Enter vulnerability details manually
- Set risk ratings and category
- Add custom exploit details
Configure Risk Ratings
Traditional Risk Scoring
If using custom risk levels (not CVSS):- Likelihood: How probable is exploitation?
- Impact: What’s the potential business damage?
- Overall: Combined risk severity (auto-calculated or manual)
CVSS Scoring
If the assessment type uses CVSS 3.1 or CVSS 4.0:- Enter the CVSS Vector String (e.g.,
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H) - Enter the CVSS Score (0.0 - 10.0)
- Overall risk is automatically mapped from score:
- 9.0-10.0 = Critical
- 7.0-8.9 = High
- 4.0-6.9 = Medium
- 0.1-3.9 = Low
Add Exploit Details
Document the technical details in the Details section:
- Steps to reproduce
- HTTP requests/responses
- Proof-of-concept code
- Affected parameters or endpoints
- Screenshots or video evidence
The details section supports HTML formatting and can include embedded images uploaded to the assessment.
Customize for This Finding
Even when using templates, customize:
- Description Notes: Add assessment-specific context
- Recommendation Notes: Tailor fix guidance to the application
- Detail Notes: Include specific evidence
Set Category and Section
- Category: Assign OWASP, CWE, or custom category for report grouping
- Section: Organize vulnerabilities into custom report sections (if enabled)
- Application component (Web, API, Mobile)
- Testing phase (External, Internal, Post-Auth)
- Custom organization
Review Tracking ID
Each vulnerability is automatically assigned a unique tracking ID:This ID:
- Persists across remediation and retests
- Links to verification workflows
- Appears in remediation queue
- Tracks closure in dev and production
Vulnerability Status Tracking
Faction tracks two closure states for each vulnerability:Development Environment
Dev Closed DateSet when the fix is implemented in development/staging. Indicates readiness for verification testing.
Production Environment
Production Closed DateSet when the fix is deployed to production and verified. This is the official closure date for SLA tracking.
Status Workflow
- Opened: Vulnerability discovered and added to assessment
- In Remediation: Assessment finalized, vulnerability assigned to remediation team
- Dev Closed: Fix implemented in development environment
- Verification Scheduled: Retest scheduled for the fix
- Production Closed: Fix verified and deployed to production
Collaborative Editing with Section Locks
To prevent editing conflicts, Faction implements section-level locking:- Description Lock: Prevents simultaneous edits to description field
- Recommendation Lock: Locks recommendation section
- Details Lock: Locks exploit details section
- Lock is automatically acquired
- Other users see who has the lock and timestamp
- Lock releases when editing completes or times out
Tracking ID for Remediation
The auto-generated tracking ID (VID-XXXX) serves multiple purposes:
- Unique Identification: Distinguishes vulnerabilities across assessments
- Retest Correlation: Links original finding to verification results
- Historical Tracking: Tracks vulnerability recurrence across assessments
- External Integration: Reference in external ticketing systems
Vulnerability History
Faction maintains complete history for each vulnerability:- When it was opened (discovered)
- When it was closed in dev
- When it was closed in production
- All verification/retest results
- Historical presence in previous assessments
The assessment view shows vulnerability history across all assessments for the same App ID, helping identify recurring issues.
Screenshots and Evidence
Add visual evidence to vulnerabilities:- Upload images to the assessment’s file repository
- Reference images in vulnerability details using HTML
- Images are embedded in generated reports
- Supports PNG, JPG, GIF formats
Using the Burp Suite Extension
The Faction Burp Extension enables real-time vulnerability creation:- Install extension in Burp Suite
- Configure Faction server connection
- Right-click HTTP request/response in Burp
- Select Send to Faction
- Vulnerability is created with request/response details pre-populated
Custom Vulnerability Fields
Add custom metadata to vulnerabilities:- Affected endpoints or parameters
- Business impact ratings
- Compliance framework mappings
- Testing methodology used
- Custom severity modifiers
Best Practices
Use Consistent Naming
Start with vulnerability type, then location: “SQL Injection in Login Form”
Leverage Templates
Use templates for common findings to ensure consistency and save time.
Include Reproduction Steps
Always provide clear steps in Details so developers can reproduce the issue.
Add Proof of Concept
Include screenshots, requests, or exploit code to demonstrate impact.
Set Accurate Risk Ratings
Consider both likelihood and impact when rating vulnerabilities.
Track Recurrence
Check vulnerability history to identify recurring security issues.
Related Resources
Creating Assessments
Set up new security assessments
Remediation Workflow
Schedule retests and verify fixes
Custom Templates
Customize report output format
API Reference
Automate vulnerability management
