All Products
Search
Document Center

Security Center:Detect application weaknesses

Last Updated:Mar 31, 2026

The weakness detection feature identifies defects and vulnerabilities in your application at runtime, including misconfigured mainstream Java frameworks and weak passwords in applications and databases. Use this feature to find weaknesses before attackers can exploit them.

Prerequisites

Before you begin, make sure that:

  • Your processes are added to the application protection feature

  • The runtime application self-protection (RASP) agent installed on those processes is version 0.5.0 or later

To check the RASP agent version, go to the Application Configurations tab, find the application group to which the processes belong, and click the number in the Access instance column to open the Instance details panel.

If the RASP agent version is earlier than 0.5.0, restart the application. The RASP agent updates automatically on restart.

View weakness detection results

  1. Log on to the Security Center console. In the top navigation bar, select the region of the asset you want to manage. You can select China or Outside China.

  2. In the left-side navigation pane, choose Protection Configuration > Application Protection.

  3. On the Weakness Detection tab, review the summary sections at the top of the page:

    • Vulnerability Overview

    • Vulnerability Detection Trend

    • Vulnerability Distribution by Type

    • Distribution of Vulnerability Detection Events by Quantity

    image.png

  4. In the lower part of the Weakness Detection tab, review the list of applications with detected weaknesses. Two columns are especially useful:

    • Application Startup ID: a unique ID within each startup cycle of the application. If the same application has been restarted multiple times, each startup has its own ID, so you can tell which weaknesses were detected during which startup.

    • Status: the overall handling status for all weaknesses in that startup. To Be Confirmed means a weakness detected on the application has not been confirmed. Confirmed means all weaknesses have been handled.

  5. Click the image.png icon to the left of an Application Startup ID to expand the weakness list. Find the weakness you want to review and click Details in the Actions column.

    The details pane shows three fields to help you decide whether to fix the weakness:

    • Weakness description: what the weakness is and why it poses a risk

    • Fixing suggestion: the recommended remediation action

    • Weakness location: where in the application the weakness was found

    image.png

  6. After reviewing the details, return to the weakness list. Click Modify Risk Status in the Actions column for that weakness.

  7. In the Modify Risk Status dialog, set Risk Status and optionally add Remarks, then click OK.

    Choose the status that best reflects your decision:

    StatusWhen to use
    To Be ConfirmedYou cannot confirm how to handle the weakness
    ConfirmedYou have confirmed how to handle the weakness
    False PositiveThe weakness does not actually exist or the detection information is incorrect
    IgnoreYou want to ignore the weakness

What's next