site/docs/enterprise/remediation-reports.md
Promptfoo Enterprise automatically generates remediation reports after each red team scan. These reports provide actionable security recommendations with implementation guidance.
Remediation reports analyze your scan results and provide:
Remediation reports are automatically generated when:
promptfoo shareTo access a remediation report:
Alternatively, you can access remediation reports directly from the vulnerabilities view by clicking on a specific finding.
The executive summary provides a high-level overview of your security posture, including:
This section helps stakeholders quickly understand the severity of issues without diving into technical details.
A quick-reference table showing:
This mapping helps you understand the relationship between vulnerabilities and fixes, making it easier to prioritize work that addresses multiple issues.
Each action item includes:
Common remediation action types include:
For each vulnerability addressed by a remediation action, the report shows:
This context helps you understand the real-world exploitation of each vulnerability and verify your fixes are effective.
If your scan data has changed or you want fresh recommendations:
Report generation typically takes 1-3 minutes depending on the size of your scan.
To share reports with your team or stakeholders:
The PDF format is optimized for sharing with technical and non-technical audiences.
For system prompt vulnerabilities, use the Harden Prompt feature:
This feature provides immediate, actionable improvements to your system prompts based on the specific vulnerabilities found in your scan.
Remediation reports can be in different states:
The report page automatically polls for updates while a report is generating, so you don't need to refresh manually.
If you run a new scan after a remediation report has been generated, the report will be marked as Outdated. An alert will appear prompting you to regenerate the report to include the most recent results.
Regenerating ensures your remediation recommendations reflect your current security posture.
Consider both impact and effort when prioritizing:
After implementing remediation actions:
Remediation reports complement the vulnerabilities workflow:
Use remediation reports to understand how to fix issues, then track your progress in the vulnerabilities page.