Skip to content

Understanding findings

Start with critical and high items — they represent the largest potential impact if valid.

Within the same severity band, prefer higher confidence when deciding what to fix first.

Ask:

  • Does this match how our protocol actually runs?
  • Is the assumption still true after our latest changes?
  • Is there a dependency or integration the finding does not cover?

Open invariants, assumptions, and decisions when available — they help you judge whether an issue is realistic for your design.

Use in-product review or status controls so your team agrees on what is accepted, fixed, or disputed.

If exploit verification ran, treat reproduced outcomes as strong evidence — but still align with your threat model.


Findings feature overview