Skip to main content

Overview

VulnZap provides comprehensive team management features for organizations to collaborate on security, manage access, and maintain audit trails.
Team features are available on Standard plans and above.

Team Members

Inviting Team Members

1

Navigate to Team Settings

Go to DashboardSettingsTeam
2

Click Invite Member

Click Invite Team Member button
3

Enter Details

  • Email address
  • Role (Owner, Admin, Member, Read-Only)
  • Projects (optional: limit access to specific projects)
4

Send Invitation

Member receives email invitation with onboarding link
5

Member Accepts

They create account and join your team workspace

Roles and Permissions

  • Owner
  • Admin
  • Member
  • Read-Only
Full Access
  • All Admin permissions
  • Manage billing and subscriptions
  • Add/remove team members
  • Delete organization
  • Transfer ownership
Limitations:
  • Only one owner per organization
  • Cannot be removed (must transfer ownership first)

Permission Matrix

ActionOwnerAdminMemberRead-Only
View all projects⚠️*⚠️*
Run scans
Apply fixes⚠️†
Invite members
Remove members⚠️‡
Manage billing
Create API keys⚠️§
Access audit logs
Delete organization
Legend:
  • ⚠️* Only assigned projects
  • ⚠️† Requires approval on critical findings
  • ⚠️‡ Cannot remove Owner or other Admins
  • ⚠️§ Personal API keys only

Project Access Control

Assigning Members to Projects

Limit member access to specific projects:
1

Go to Project Settings

Dashboard → Projects → Select project → Settings
2

Access Control Tab

Navigate to Access Control tab
3

Add Members

  • Click Add Member
  • Select team member(s)
  • Choose permission level (Read, Write, Admin)
4

Save Changes

Member now has access to this project only

Project Permission Levels

Read:
  • View findings
  • View scan history
  • Export reports
Write:
  • Read permissions +
  • Run scans
  • Apply fixes
  • Comment on findings
Admin:
  • Write permissions +
  • Project settings
  • Manage project members
  • Delete project

API Key Management

Personal API Keys

Each team member can create personal API keys:
# Member creates personal key
vulnzap auth
Scope: Limited to projects the member has access to. Usage Limits: Based on team’s plan limits (shared quota).

Shared API Keys

Admins can create shared team API keys:
1

Navigate to API Keys

Dashboard → SettingsAPI Keys
2

Create Team Key

Click Create Team API Key
3

Configure

  • Name: “CI/CD Pipeline”
  • Scope: All projects or specific projects
  • Permissions: Read-only or Full access
  • Expiration: 90 days, 1 year, or Never
4

Copy Key

⚠️ Important: Copy immediately, won’t be shown again
Best Practices:
  • Use shared keys for CI/CD pipelines
  • Use personal keys for developer workstations
  • Rotate keys every 90 days
  • Revoke keys when members leave

Audit Trails

Viewing Audit Logs

Track all team activity:
Dashboard Settings Audit Logs
Logged Events:
  • Member invited/removed
  • Role changed
  • Project access modified
  • API key created/revoked
  • Scan executed
  • Fix applied
  • Settings changed
  • Billing updated

Example Audit Log

┌─────────────────────────────────────────────────────────────────┐
│ Timestamp           │ User              │ Action                │
├─────────────────────────────────────────────────────────────────┤
│ 2025-10-19 14:32:11 │ admin@example.com │ Created API key       │
│ 2025-10-19 13:45:03 │ dev@example.com   │ Applied fix (Critical)│
│ 2025-10-19 12:21:34 │ dev@example.com   │ Ran full repo scan    │
│ 2025-10-19 09:15:22 │ admin@example.com │ Added project         │
│ 2025-10-18 16:42:11 │ admin@example.com │ Invited member        │
│ 2025-10-18 14:28:05 │ owner@example.com │ Upgraded to Scale     │
└─────────────────────────────────────────────────────────────────┘

Exporting Audit Logs

For compliance requirements:
# Export last 90 days
GET /api/v1/audit-logs?since=90d&format=csv

# Export specific date range
GET /api/v1/audit-logs?from=2025-01-01&to=2025-03-31&format=json
Available Formats: CSV, JSON, PDF
Audit log retention period depends on your plan: 7 days (Free), 30 days (Standard), 90 days (Scale), 365 days (Enterprise).

Notifications

Team Notification Settings

Configure who gets notified for what: Per-User Settings:
Dashboard → Settings → Notifications
  • ✅ New critical findings in my projects
  • ✅ Scan completion (my scans only)
  • ⬜ All team scans
  • ✅ Weekly summary report
  • ⬜ Billing alerts (Admins/Owners only)
Team-Wide Settings (Admin/Owner):
Dashboard → Settings → Team → Notifications
  • New Critical Findings: Notify all team members
  • Failed Scans: Notify project owners only
  • Member Changes: Notify Admins and Owner
  • Quota Warnings: Notify billing contact

Notification Channels

  • Email
  • Slack
  • Webhook
  • In-App
Individual email notifications:
  • Immediate for Critical findings
  • Digest for Medium/Low findings
  • Weekly summary reports

Collaboration Features

Comments and Discussions

Team members can discuss findings:
1

Open Finding

Click any finding in dashboard
2

Add Comment

Scroll to Discussion section
3

@Mention Members

@alice can you review this SQL injection fix?
I think we need to update all similar queries.
4

Member Gets Notified

Alice receives email and in-app notification

Assigning Findings

Assign findings to specific team members:
Finding Details → Assign To → Select Member
Assigned member receives:
  • Email notification
  • Task in their dashboard
  • Deadline reminder (optional)

Fix Approval Workflow

For critical changes, require approval: Settings → Team → Approvals:
approval_required:
  - severity: critical
    approvers: 1  # Require 1 approval
    auto_merge: false
  
  - severity: high
    approvers: 0  # No approval needed
    auto_merge: true
Workflow:
  1. Member applies fix to critical finding
  2. Fix marked as “Pending Approval”
  3. Admin/Owner reviews and approves
  4. Fix is applied to codebase

Team Dashboard

Overview Metrics

Team-wide security posture:
┌─────────────────────────────────────────────────────────┐
│ Team Security Dashboard                                 │
├─────────────────────────────────────────────────────────┤
│ Total Projects: 12                                      │
│ Active Members: 8                                       │
│ Overall Risk Score: 34 (Low)                           │
│                                                         │
│ This Month:                                            │
│   Scans: 342                                           │
│   Findings: 127                                        │
│   Fixed: 98 (77%)                                      │
│   Open: 29 (23%)                                       │
└─────────────────────────────────────────────────────────┘

Project Health Overview

See all projects at a glance:
ProjectRisk ScoreLast ScanFindingsOwner
api-server67 (Medium)2h ago🔴2 🟠5 🟡3alice@example.com
frontend23 (Low)1d ago🟢5bob@example.com
mobile-app45 (Medium)3h ago🟠3 🟡8carol@example.com

Member Activity

Track team member contributions:
MemberScans RunFixes AppliedProjects
alice@example.com45323
bob@example.com32282
carol@example.com28151

Seat Management

Adding Seats

As your team grows:
1

Go to Billing

Dashboard → SettingsBilling
2

Manage Seats

Click Manage Seats
3

Add Seats

Current: 5 seats (95/month)Add:3moreseatsNewTotal:8seats(95/month) Add: 3 more seats New Total: 8 seats (152/month)
4

Confirm

Prorated billing for current period

Removing Seats

When members leave:
  1. Remove member from team
  2. Seat becomes available for new member
  3. At end of billing period, downgrade unused seats
No immediate charge/refund - billing adjusts next cycle.

Single Sign-On (SSO)

SSO is available on Enterprise plans only.

Supported Providers

  • SAML 2.0: Okta, Azure AD, OneLogin, Auth0
  • OAuth 2.0: Google Workspace, Microsoft 365
  • LDAP: Active Directory integration

Setting Up SSO

Contact enterprise@vulnzap.com for SSO setup assistance.

Best Practices

  • Give members minimum necessary access
  • Use Read-Only role for stakeholders
  • Limit Admin role to 2-3 people
  • Regular access reviews quarterly
  • Rotate keys every 90 days
  • Use shared keys for CI/CD only
  • Revoke keys immediately when members leave
  • Monitor key usage in audit logs
  • Group related projects
  • Assign clear project owners
  • Document project security requirements
  • Regular project health reviews
  • Use comments for async discussions
  • @mention relevant team members
  • Set up Slack integration for real-time alerts
  • Weekly security standup meetings

Next Steps