Skip to main content

Reporting and Verifying Fixes

Mark a finding as fixed and verify its resolution to update risk calculations in the Cye platform.

Overview

This article explains how to report that a finding has been fixed, and how to verify that the fix is complete.
Marking a finding as Fixed updates all relevant calculations in the Cye platform — including attack paths in the Org. Attack Graph and breach likelihood. Verification confirms the resolution and adds a layer of accountability.


1. Report a finding as fixed

  1. Go to the Findings page by clicking the icon in the left-hand navigation.

  2. Click a row in the list to open the finding's details in the right-hand pane.

  3. In the Status field at the top, select Fixed.

  4. You'll be prompted to add a comment explaining what action was taken to resolve the issue.

Once marked as Fixed, all downstream logic is updated:

  • Edges in the Org. Attack Graph are removed

  • The finding's likelihood is recalculated

  • Risk exposure values are adjusted


2. Verify the fix

After marking a finding as Fixed, it should be verified — either by your team or by the CYE service team, depending on your agreement.

  • In the right-hand pane, check the box labeled Has been verified:

  • Once verified, the finding will display a green shield icon in the Findings list

✅ The Has been verified option only applies to findings of type Vulnerability


3. Verify in bulk

You can verify multiple findings at once:

  1. Select multiple rows from the Findings list

  2. Click the pencil icon on the toolbar

  3. Choose an option to apply verification to all selected findings

Important rules for bulk verification:

  • If some findings are fixed and others are not, the verification option is disabled

  • You must either remove unfixed findings from the selection, or fix them first

  • You need at least the Editor and Finding & Graph Initiator permissions at the engagement level


Wrap-up / Next Steps

Fixing a finding is just the first step. Verifying it closes the loop and ensures the data in the Cye platform reflects reality — from attack graphs to exposure metrics.

Did this answer your question?