Exporting without triage context
Before sharing externally, summarize highest-priority findings and remediation status so reports remain actionable.
Use report outputs to prioritize remediation, communicate findings, and maintain repeatable review quality.
Users who need to interpret, share, and operationalize vulnerability findings.
Use this checklist to make sure the workflow guidance applies cleanly to your current task.
Follow these steps in order for a reliable and repeatable outcome.
Start with critical and high-signal issues before lower-priority hardening opportunities.
Pair what was observed with the recommended corrective action so fix plans stay concrete and auditable.
Use the output that matches the workflow: in-app views for private review, HTML/PDF/JSON artifacts when they are generated, copied URLs when a route or artifact needs to be referenced, and supported public-safe pages only when that workflow is intentionally used. API spec scans now follow the same stored-report pattern, so imported-spec findings can be reviewed later from scan history rather than being treated as throwaway output.
Revalidate after fixes and compare outcomes so score movement and finding closure can be verified.
Use this checklist to confirm the workflow was completed correctly.
If something does not match expectation, check these common failure modes first.
Before sharing externally, summarize highest-priority findings and remediation status so reports remain actionable.
A copied URL can point to an app view, a temporary report artifact, or a public-safe route depending on the workflow. Confirm what the recipient is meant to open before distributing it.
Always rerun after remediation to verify closure and avoid reporting assumptions.
API spec scans are saved in account history and can generate stored report artifacts. Review the result from scan history when you need to share or compare the imported-spec workflow later.
Use these links to continue your workflow without losing context.
Open Scans And Depths to continue this workflow.
Open Help: Reports And Sharing to continue this workflow.
Open Tools And Guides to continue this workflow.
Open How to Fix Missing Security Headers to continue this workflow.
No. Reports can be used by technical and decision stakeholders when paired with clear remediation context and risk prioritization.
Continue to the best next page based on where you are in your workflow.