Skip to main content

Changelog 2026-03

Updated yesterday

[CORE] New Host field in the report metadata

Key changes

  • A new "Host" field is now displayed in all vulnerability reports' metadata.

ℹ️ Notes:

  • A new "Host" column is now available in the Vulnerability Center to filter the results on specific hosts.

  • This host field is also available in the YesWeHack API and Bug Tracker integrations.

  • Retro-activity: this new host field will be filled in on every existing report, without overriding existing information.

Impact

  • This new field gives organisations better visibility on their vulnerabilities and simplifies report management.

Audience

  • All organisations with reports in their vulnerability center.

Usage

ℹ️ Notes:

  • The Host field of Autonomous Pentest findings cannot be edited.

  • Go to the Vulnerability Center

  • Open a given report

ℹ️ The report title now includes the host instead of the scope.

  • Find the Host field below the Scope field

  • Click on “View Host” to open the corresponding host page

ℹ️ This button is only available to our Autonomous Pentest and Continuous pentesting customers.

  • If the Host doesn’t exist on your Attack Surface, you can add it as a Primary Asset to continuously monitor it.


[CORE] Automated Metadata Completion

Key changes

Report metadata is critical for organisations to accurately assess vulnerabilities and their impact.

To accelerate report processing and improve consistency, we're introducing Automated Metadata Completion, which suggests or automatically populates the fields.

These suggestions are applied to the following fields:

  • Bug Type

  • Endpoint

  • Host

  • Vulnerable part

  • Parameter

  • Payload

Impact

  • Metadata suggestions eliminate manual data entry, reducing the time needed to process vulnerability reports.

Audience

  • All organisations with vulnerability reports in their Vulnerability Center.

Usage

ℹ️ Notes:

  • The Metadata Completion feature is enabled by default and can't be applied to imported reports.

Example:

  • Go to the Vulnerability Center

  • Click on a choosen vulnerability report

  • Click on “Edit” in the report metadata section

  • Find all metadata suggestions

  • Apply suggestions one by one or click on “Apply all” at the top right corner

ℹ️ Notes:

  • This example uses the "On-demand" configuration. To have metadata populated automatically on every report, select "Auto" in the configuration panel.


[CORE] Configurable Severity Threshold for Assessment Notifications

Key changes

Organisations can now set a minimum severity threshold for triage notifications, so teams only get alerted on assessments that meet their criteria.

Impact

  • Organisations can now manage triage assessment according to their priority levels.

Audience

  • All users of the YesWeHack platform with triaged reports.

Usage

  • Go to your “User Settings”

  • Click on “Notifications”

  • Check the email box for triage assessment notifications

  • Define the severity level

ℹ️ By default, the severity level is set to None, meaning that every assessment will trigger a notification.


[ANPT/CPT] End-of-life statuses for exposed Technologies

Key changes

The YesWeHack platform already provides organisations with a list of technologies identified in their primary assets and hosts, along with an overview of potential CVEs affecting these technologies. New icons now alert organisations when a technology is outdated or soon-to-be outdated.

Impact

  • Organisations can now proactively manage their exposed technologies by tracking product lifecycles and identifying end-of-life statuses directly within the platform.

Audience

  • All Autonomous Pentest (ANPT) and Continuous Pentesting (CPT) customers with exposed technologies.

Usage

ℹ️ These new icons are displayed in the different Attack Surface tabs (e.g., Hosts, Technologies) and on the CVE Alert page. Learn more here.

  • Go to the “Attack surface tab”

  • Click on “Hosts” in the left-side menu

  • Select a host

  • Go to the “technologies” tab


⬆️[ANPT] Automatic confirmation of detected issues

Key changes

Organisations can now enable automatic confirmation of detected issues, turning them into Vulnerability Reports as soon as a detection occurs.

This automated confirmation can be set by priority levels.

Impact

  • With automatic confirmation, organisations streamline their handling of Detected Issues by removing the confirmation step.

Audience

  • All Autonomous Pentest (ANPT) customers.

Usage

ℹ️ This feature is configured at the Business Unit level.

  • Go to your “Admin Panel”

  • Click on “Attack Surface > Security Check” in the left-side menu

ℹ️ Security Check must be enabled to access this feature. Learn more here.

  • Click on “Advanced settings”

  • Enable automatic confirmation

  • Select a priority level

  • Click on “Save”


[ANPT/CPT] Export technologies instances

Key changes

Organisations can now export information about technologies (e.g., host, version, last reach date, and report ID) from the YesWeHack platform. The export will take into account all selected filters.

Audience

  • All Autonomous Pentest (ANPT) and Continuous Pentesting (CPT) customers with exposed technologies

Usage

  • Go to the “Attack Surface” tab

  • Click on “Technologies” in the left-side menu

  • Click on “Export”

  • Select the format: CSV, XLS or JSON

  • Select a Business Unit

  • Check the box to apply filters (Optional)

  • Click on “Export”

ℹ️ All exported files appear in the Export History.


[PTM] Report transfer between programs

Key changes

Organisations can now transfer reports from one Pentest program to another, avoiding having to recreate them manually.

Audience

  • All Pentest Management customers.

Usage

ℹ️ Report transfer must be enabled in the Admin platform to access this feature. Please contact your dedicated Customer Success Manager for more information.

  • Select a report from a Pentest program.

  • Click on “Transfer report”

ℹ️ You need to start at least one other Pentest program to see this button.

  • Select the program where you want to transfer the report

  • Click on “Transfer”


⬆️[BugTrackers] Synchronisation based on Program Type

ℹ️ Find more information about the YesWeHack BugTracker here.

Key changes

Organisations can now filter which reports to synchronise with their Bug Trackers based on the program types (e.g., Bug Bounty, Pentest) they belong to.

Impact

  • Organisations no longer have to configure a tracker for each program they want to track.

Audience

  • All organisations using the YesWeHack to Bug Tracker client.

Usage

⚠️ For current users of the YesWeHack Bug Tracker: it is not possible to revert changes once the configuration has been updated.

  • Go to your YesWeHack Bug Tracker configuration panel

⚠️ Please note that if you have several configurations for the same bug tracker projects, they must all use the same KEY. Modifying the KEY value is not recommended, as this will result in all your reports being duplicated within the bug tracker.

  • When creating a new configuration, in the YesWeHack section > Programs section (Note: The previous steps before "Set up YesWeHack tracker" remain unchanged):

    • Enter a “criteria title” (optional)

    • Indicate “Program slugs” (Optional). (Note: Write “ * ” to include all programs of a program type.)

ℹ️ This field is now optional, but for organisations that keep their current configuration, there will be no impact.

  • And/or check each box of the program type options you want to track. In our case, select “Bug Bounty” to track all Bug Bounty programs.

TIPS:

  • If you select all program types, the tracker will include all programs within your Business Unit.

  • To track one Bug Bounty program and one Pentest program, enter the program slugs without selecting a program type (ie. “old” configuration).

  • Personal access token: It is not possible to edit an existing PAT (Personal Access Token); it can only be revoked. However, you can create a multi-role PAT to grant access to several programs (e.g., programs 1, 2, and 3). A bug tracker at the Business Unit level can also be used in this case.

[MISC]

  • [CORE] The limit of character for the program description and program account access fields has been increased.

  • [CORE] The global search bar in the Vulnerability Center now supports CVE ID queries, returning all vulnerability reports associated with that CVE.

  • [CORE] Emails related to the same report are now automatically grouped into a single thread in your inbox, making it easier to view the full history.

  • [BugTrackers] All reports of a given program can now be grouped automatically under the same JIRA epic.

  • [ANPT] In the metadata, organisations can no longer edit the app fingerprint related to outdated technologies and potential CVE reports.

  • [ANPT] Reports generated through the Autonomous Pentest solution are now automatically tagged by their source of creation, enabling organisations to better track these vulnerability reports (i.e., detected_issue, potential_cve, outdated_technology)

  • [ANPT] A new message is displayed to explain the impact of excluding an asset (ie., "Excluded assets are hidden from the platform and are not included in discovery or security check scans.")

  • [ANPT] Two “Go to” buttons (ie., “Go to the report” and “Go to the technology”) are now available when clicking on “Hosts tab > selected Host > Technologies”.

  • [ANPT] Organisations can now filter Techno’s potential CVE by status. (Note: By default, the status is filtered to “pending” and “confirmed”)

  • [HUNTER] New notifications about programs (i.e., enabled, disabled, updated) are available to inform hunters of any program changes.

  • [HUNTER] A new “Disabled” tag is now displayed on programs to help hunters understand why they cannot submit a report.

Did this answer your question?