Here’s what you can expect in a Pentest Report.
Get a summary of vulnarabilities in your software.
Download a pentest report to view security issues that pentesters found.
To download a report as a PDF file:
- On the pentest page, navigate to Report.
- If available, select the report type.
- Select Download.
Pentest Report Types
|Report Type||Available for Pentest Type||Description||Customizable|
|Automated Report||Agile||A system-generated report for an Agile Pentest intended for internal use. Includes the following sections:
|Customer Letter||Comprehensive, In-House||An executive summary of the pentest. May be used as a certificate of completion. Great for external stakeholders. Includes:
|Attestation Report||Comprehensive, In-House||A report similar to Customer Letter, with additional details:
|Attestation Letter||Comprehensive, In-House||A one-page report suitable for external stakeholders. Includes the following:
|Full Report||Comprehensive, In-House||A report that contains comprehensive information about the pentest. Includes the following sections:
|Full Report + Finding Details||Comprehensive, In-House||A report that adds details of every test finding to the Full Report. Finding details include:
NoteWe do not create multiple pentest reports for large assets. For example, if you want separate pentest reports for different APIs, set up different pentests for each API.
You may be able to create a customized pentest report.
Cobalt partners can add their logo to pentest reports.
Last modified April.04.2023