Flusk FAQ

Will Flusk slow down my app?

Flusk operates with minimal impact on your application's performance. Its processes are optimized to run efficiently in the background, ensuring that your application's speed and responsiveness remain unaffected.

Can I use Flusk to perform security audits for customers?

Yes, Flusk is equipped to conduct thorough security audits, making it suitable for client-facing assessments. Its detailed reporting capabilities provide valuable insights into potential vulnerabilities, assisting in delivering comprehensive security evaluations.

How can I use Flusk as an agency?

Agencies can leverage Flusk to manage and secure multiple client applications effectively. Its multi-tenant architecture allows for streamlined oversight, ensuring each client's application maintains robust security standards.

Do I need to give Flusk access to my app?

To perform comprehensive security assessments, Flusk requires specific access permissions to your application. This access is strictly controlled and used solely for security evaluation purposes.

Does using Flusk consume Bubble workload units (WU)?

The integration of Flusk is designed to operate efficiently, with negligible impact on Bubble . Its processes are optimized to ensure that your application's resource consumption remains within acceptable limits.

How do I add a member to my Flusk app?

To add a member to your Flusk application, navigate to the 'Team' section within your Flusk dashboard. From there, you can invite new members by entering their email addresses and assigning appropriate roles and permissions.

Does Flusk support multiple app versions?

Flusk offers multi-version support, enabling the detection and resolution of issues across different application . This functionality allows for effective tracking of issues in various environments, such as development and live.

Tests on deploy for Flusk

The 'Tests on Deploy' feature allows for automatic execution of security tests upon deploying new application versions. This proactive approach ensures that potential vulnerabilities are identified and addressed promptly, maintaining the integrity of your production environment.

Scheduled tests in Flusk

Flusk enables the scheduling of regular security assessments, ensuring continuous monitoring of your application's security status. This systematic approach aids in the early detection of vulnerabilities, facilitating timely remediation.

Exporting a security report as PDF

Flusk allows for the export of comprehensive security reports in PDF format. These documents can be utilized for internal reviews or shared with external stakeholders to demonstrate your application's security compliance.

What is Flusk deployments?

Flusk provides deployment tools that streamline the process of releasing new application versions, such as scheduling them, and smart deploying (deploying when no users are live between two dates). These tools ensure that deployments are conducted securely and efficiently, minimizing potential disruptions.

What is Flusk analytics?

Flusk Analytics offers insights into application performance and user behavior. By analyzing this data, you can make informed decisions to enhance both security and user experience.

What is the Flusk error catcher?

The Flusk Error Catcher identifies and logs application errors in real-time. This feature facilitates prompt troubleshooting, contributing to improved application stability and reliability.

How to find my App ID?

Your Application ID can be located within the settings section of your Flusk dashboard. This identifier is essential for various administrative and support processes.

My application is pending verification?

If your application is pending verification, please ensure that all required information has been submitted accurately. The verification process may take some time; your patience is appreciated.

How do I add Flusk as a collaborator to my Bubble app.

To add Flusk as a collaborator, access your Bubble application's settings and navigate to the 'Collaboration' section. From there, you can invite Flusk by entering the appropriate collaborator details.

How do I add custom branches/versions in Flusk

Flusk supports the addition of custom branches or versions, allowing for tailored security assessments across different development stages. This flexibility aids in maintaining consistent security standards throughout the development lifecycle.

How to enable/disable Bubble versions on Flusk?

Within Flusk, you can manage the activation status of different application versions for security assessments and monitoring. This control enables you to focus resources on pertinent versions, optimizing the security evaluation process.

I can’t see any logs in the visual log explorer

If logs are not visible in the visual log explorer, verify that logging is enabled and properly configured. Additionally, ensure that there are no connectivity issues between your application and the logging service.

How does the AI Privacy Rules Checker access my app data?

The AI Privacy Rules Checker uses a series of requests to your Bubble.io app to gather publicly available information accessible via web browsers. This information is processed on an external server to aggregate and format it for clear and actionable display.

Additionally, the tool can access your app’s database directly, allowing for a thorough assessment of potential data vulnerabilities beyond what is exposed through the Data API.

This analysis helps ensure your Bubble.io app adheres to privacy rules and protects against security risks, utilizing advanced safeguards to prevent unauthorized access or exploitation.

Will the AI Privacy Rules Checker compromise my app security?

The AI Privacy Rules Checker does not compromise the security of your Bubble.io app or perform any unauthorized activities. The tool works exclusively with information that is already publicly accessible.

To further prevent data leaks, the tool obfuscates example data unless you are the verified app owner and does not store any user data on its servers. The primary objective of the tool is to improve Bubble.io security and encourage safe development practices.

How does the AI Privacy Rules Checker secure and process my app's data?

The AI models work exclusively with database structures, such as field names and types, without ever accessing the actual database content.

Does the AI Privacy Rules Checker store any data from my app?

We prioritize data security and ensure that no sensitive data related to your Bubble.io app’s structure or content is stored. Additionally, your app’s database content is never shared with third-party services.

For analytical purposes, only minimal information—such as the app URL, app ID, and the results of the privacy rules test—is stored. This helps us enhance our services and address potential vulnerabilities. Our commitment is to strengthen Bubble.io security and protect your app from potential risks.

Can the AI Privacy Rules Checker detect data leaks even if my Data API is not open?

The tool can identify misconfigured privacy rules even when your app’s Data API is turned off. Disabling the Data API does not eliminate the need for properly configured Privacy Rules to ensure your app’s data remains secure.

Last updated