The Issues Explorer
The Issues Explorer is Flusk’s generated security report, displaying potential vulnerabilities in a detailed, line-by-line format. The report is organized in a table format with the following columns:
Type Assigned: This column categorizes the type of vulnerability each row addresses, helping you quickly identify the nature of the issue.
Item: This column specifies the exact part of your app to which the vulnerability applies, such as a particular data type or an app setting.
Criticality: This shows Flusk’s assessment of the vulnerability’s importance, rating each as low, medium, or high. This rating helps prioritize which vulnerabilities may require the most immediate attention.
Version: This shows the app version to which the issue applies.
Assigned: This optional setting lets you designate a specific team member to investigate and address the issue.
Filtering issues
At the top of the issue explorer, you’ll find different filters to help you narrow down specific issues that you’d want to focus on.
The following filters can be applied:
Location: this lets you specify where in your app a category of issues occurs. For example, you can choose to show only issues related to APIs or the Database.
Filters: this lets you assign more complex filters, such as the type of issue, its criticality or search for its ID.
Versions: Lets you filter issues by a specific .
Assigned: Lets you show only issues assigned to a specific user.
Search: Lets you search by filters by freetext.
Note that changing the filters on this top row doesn’t change or resolve any issues, but only filters which are displayed in the list,
Revealing issue details
Click on each row of the issues explorer reveals more information about that specific issue. This provides the following additional information:
Actions:
Ignore issue: this lets you exclude the issue from future reports
Resolve issue: this lets you mark the issue as resolved
Status: The status field gives you a timeframe of when the issue was first revealed, as well as the time it was last checked.
Issue description: The issue description gives you a more in-depth explanation of what exactly the issue is about, and can point you towards a recommended fix.
Issues
For a more in-depth explanation of the issues listed below, see the article below:
Article: Flusk issue details
Issues are separated into categories. The table below gives a short description of each category and issue, and the following section describes each issue in more detail.
See more details about the recommended collaboration settings below.
Privacy and data security
Privacy rules definition
Sensitive clear data in login workflows
Check if sensitive data is exposed in login actions.
Public sensitive fields
Page access protection
Verify that sensitive pages (e.g., admin dashboards) have proper redirection or access controls.
Database leaks
Identify potential data leaks due to misconfigured searches or data exposure.
API Connector sensitive parameter
Check if sensitive parameters (e.g., API keys, unique IDs) are exposed in API calls.
Visible URL in API call
Ensure no sensitive URLs are exposed in API calls.
Backend workflows protection
Confirm that backend workflows are not publicly exposed.
Assign temp password vulnerability
Check for vulnerabilities related to temporary passwords.
Swagger privacy
Ensure the Swagger file doesn’t expose sensitive API information.
Public file uploader
Make sure file uploaders store files privately.
Public picture uploader
Ensure picture uploaders store images privately.
iFrame restriction
Check that your app cannot be rendered in an iFrame to prevent clickjacking.
User and account security
Editor privacy
Ensure your editor is set to private or secure access levels.
Password policy
Confirm that the password policy is strong enough to protect user data.
Test version protection
Verify that your test version is protected by a username/password combination.
Default username/password combo
Ensure that the default username/password combination isn’t in use.
Bubble collaborators
Check for unauthorized collaborators, and ensure each collaborator is approved.
API & Token Security
Bubble API tokens
Manage internal API tokens to grant only necessary permissions.
Unsafe Google Maps API token
Ensure your Google Maps API token has HTTP referrer restrictions.
Collaboration settings
Generally, we recommend giving Flusk the following collaborator permission settings:
Admin
No (unchecked)
App
View and edit
Data
No permission
Logs
View and query
Only dev. version
No (unchecked)
If you use alternative configurations, you may prevent some of Flusk's features from working as expected:
App
View only
This will prevent some features such as scheduling deployments from working.
Logs
No permissions
This will prevent most monitoring features (such as the Log Explorer or Error Explorer) from working.
Only dev. version
Yes (checked)
This will prevent security testing and monitoring on your live version and some features such as scheduling deployments from working.
No collaborator access
Scheduled tests
Scheduled testing can easily be set up to run from a set date, and thereby on the following interval:
Daily
Weekly
Bi-weeks
Monthly
Every 3 months
Custom (down to the hour)
The test will first run at the specified date and time, based on the time zone of your current device.
Privacy rules checker
The privacy rules checker runs a thorough analysis of your entire database. Depending on the size of your database, the process can take a few minutes to complete
This dedicated test reviews all data types within an app (and version) to identify which fields are publicly accessible. It checks each data type for potential information leaks, highlighting any fields that are accessible without restrictions for your review. This allows you to inspect and adjust as needed to secure the data.
To instruct Flusk which fields are considered sensitive and which are public, you use the data type rating tool, described below.
Rating data types
To ensure that the test gives a useful and correct result, you can use the Database review tool to map each individual as:
Safe: the data in the field can be accessible to anyone, including through the Data API.
Sensitive: the data in the field should be protected with , and should not be accessible by anyone without the proper authentication.
Article section: Tools and setting | Data rating
Last updated