Skip to main content
availability

Package: Invicti AppSec Core (on-demand)

Dashboard overview

The Dashboard provides a comprehensive view of your application security posture through two main tabs: AppSec and API Insights.

Data and display

The Dashboard automatically loads the most recent data and updates as new scans complete and vulnerabilities are discovered or resolved. Metrics may take a few moments to populate after login due to dynamic loading.

False positive and risk accepted vulnerabilities are automatically excluded from all charts and metrics.

Why this matters

Without a central view of your security posture, it's easy to lose track of where vulnerabilities stand, how long they've been open, and whether remediation efforts are actually working. The Dashboard brings all of this into one place - giving you real-time metrics, trend data, and risk indicators across your projects and APIs so you can prioritize work, track progress, and report on security health without running individual reports.

AppSec tab

The AppSec tab displays your organization's overall security posture through a set of key metrics, cards, and charts.

Summary metrics

The top section shows four high-level KPIs and two vulnerability gauges:

  • Total Projects: the total number of projects in your organization.
  • Avg. Risk Score: the average risk score across all projects.
  • Failing CI/CD SC: the number of projects failing CI/CD security checks.
  • Failing ASVS: the number of projects failing ASVS compliance checks.
  • Avg. Vuln. Score: the average vulnerability score across all projects, shown on a scale of 0 to 10.
  • Open Vulnerabilities: the total count of open vulnerabilities, including a count of those with known exploits.
AppSec summary metricsAppSec summary metrics

Metric cards

Four cards provide detailed breakdowns of key security indicators:

  • Issues: vulnerabilities with an open issue, broken down by severity.
  • Overdue: vulnerabilities exceeding their SLA remediation deadline, broken down by severity.
  • WOE (Window of Exposure): the average time vulnerabilities remain open and exploitable.
  • MTTR (Mean Time to Remediate): the average time taken to fix vulnerabilities from discovery to resolution.
AppSec metric cardsAppSec metric cards

Security KPI trend

Tracks five key security metrics over a selected date range, broken down by severity:

  • Time to first response: how long the security team takes to triage a vulnerability on average.
  • Time to first action: how long the development team takes to start working on a vulnerability on average.
  • Time to resolution: the average time the development team spends on a vulnerability.
  • Time to remediate: how long it takes to close vulnerabilities on average.
  • Go-live delay: how long it takes for vulnerabilities to disappear after the issues are closed on issue trackers on average.

Severity categories can be filtered by clicking the severity legend at the bottom.

Security KPI Trend chartSecurity KPI Trend chart

Score snapshot

Shows the risk or vulnerability score (Y-axis) against the number of vulnerabilities (X-axis) for each project or team. Colored circles indicate performance relative to average: green for better than average, yellow for slightly worse, and red for significantly worse. A blue circle marks the intersection of the average risk score and average findings.

Score Snapshot chartScore Snapshot chart

Vulnerability summary

A table showing the overall vulnerability situation, updated as new scans complete or vulnerabilities are marked as false positives or risk accepted. Counts are broken down by status (New, Recurrent, Closed, Risk Accepted, False Positive) and severity (Critical, High, Medium, Low).

  • New: vulnerabilities discovered for the first time. Vulnerabilities that were closed and rediscovered are classified as recurrent, not new.
  • Recurrent: vulnerabilities discovered in two or more consecutive scans, including those that were closed and then rediscovered.
  • Closed: vulnerabilities that disappeared in a subsequent scan after being discovered.
  • Risk Accepted: vulnerabilities marked as Won't Fix or Mitigated - excluded from all charts and metrics.
  • False Positive: vulnerabilities marked as false positive by the user or scanner - excluded from all charts and metrics.
Vulnerability Summary tableVulnerability Summary table

Burndown chart

Shows the evolution of open and closed vulnerabilities over a selected date range. The green area represents the sum of open and closed vulnerabilities; the red area represents open vulnerabilities only (new and recurrent). Severity categories can be filtered by clicking the severity legend at the bottom.

Burndown ChartBurndown Chart

Additional charts

The AppSec tab supports up to 14 active charts simultaneously. Beyond the default set above, the following charts are also available:

  • Closed Vulnerabilities: a comparison graph showing the number of closed vulnerabilities across projects, products, business units, or teams within a selected period (last 90 days).
  • Industry Standards: shows the distribution of all vulnerabilities by OWASP Top 10, PCI, and NIST categories. Closed vulnerabilities can be included or excluded via the legend.
  • Issue Trend: shows the evolution of issue tracker ticket statuses (open, in progress, closed) over time, broken down by severity.
  • New Vulnerabilities: a comparison graph showing newly discovered vulnerabilities as increases and closed vulnerabilities as decreases on the Y-axis, for a selected period (last 90 days).
  • New vs. Closed Trend: shows the number of new and closed vulnerabilities within a selected period (last 90 days). Weeks are treated as calendar weeks (Mon to Sun).
  • Recurrent Vulnerabilities: a comparison graph showing the number of recurrent vulnerabilities (discovered two or more times) across projects, products, business units, or teams for a selected period (last 90 days).
  • Risk Score Trend: shows the evolution of the average risk score over time.
  • Severity Snapshot by Team: shows the number of new and recurrent vulnerabilities in projects assigned to selected teams, broken down by severity.
  • Severity Trend: shows the evolution of the total number of new and recurrent findings under each severity category over time.
  • Suppressed Vulnerabilities Expiring in a Week: shows the number of vulnerabilities marked as false positive, won't fix, or mitigated with an expiration date in the next seven days, broken down by severity.
  • Vulnerability Density: shows the frequency of the top 25 vulnerabilities regardless of status. Circle size indicates how often a vulnerability was discovered. Can be viewed by CWE ID, endpoint, or file/path.
  • WOE by Severity: shows the distribution of new and recurrent vulnerabilities by their aging and severity. Includes a WOE Top Ten tab showing the ten vulnerabilities with the highest Window of Exposure.

API insights tab

The API Insights tab provides comprehensive API security metrics through a top row of five summary cards, followed by detailed analysis sections.

API summary metrics

The top section displays key API metrics in five summary cards:

API Insights summary metrics cardsAPI Insights summary metrics cards
  • Discovered APIs without a Target: APIs found but not configured for scanning
  • APIs in catalog: Total catalogued APIs in your system
  • Operations in API catalog: Total API operations/endpoints across all APIs
  • Vulnerable APIs: Number of APIs with identified vulnerabilities
  • Open vulnerabilities: Current count of unresolved API vulnerabilities

Detailed analysis sections

Below the summary cards, the tab provides four detailed analysis sections:

Open API vulnerabilities

Displays the current count of unresolved vulnerabilities with a detailed breakdown by severity levels in a table format. Includes a Vulnerabilities by severity table showing Critical, High, Medium, Low, and Informational vulnerabilities along with their Mean Time To Remediate (MTTR) values.

Most recent discovered APIs

Shows a table of the latest APIs discovered in your environment, including the API name, base URL, and discovery timestamp. This helps track new API additions and ensures newly discovered APIs are properly secured and monitored.

Most vulnerable APIs

Lists the APIs with the highest vulnerability counts, allowing you to prioritize remediation efforts on the most at-risk components of your API infrastructure. When no vulnerable APIs exist, displays guidance on adding API sources.

Average vulnerabilities per API

Presents a chart showing vulnerability trends over time, providing insight into overall API security quality and helping assess the security maturity of your API development practices.


Need help?

Invicti Support team is ready to provide you with technical help. Go to Help Center

Was this page useful?