Asset Inventory

The Asset Inventory page provides a centralized view of all assets discovered, imported, or manually added to your Bugcrowd Organization. From here, you can search, filter, and manage assets to maintain an accurate, risk-based inventory.

Asset inventory

To access the Asset Inventory page:

  1. Log in to your Bugcrowd organization.
  2. In the top navigation bar, click Assets.
  3. In the left sidebar, click All assets.
  4. The Asset Inventory page opens, displaying all assets in your organization.

Page Overview

At the top of the page, you’ll find:

  • Total Assets: The number of assets currently in your inventory.
  • Vulnerabilities: The total number of vulnerabilities associated with your assets.
  • Trend Lines: Visual representation of how your Total Assets and Vulnerabilities have changed over time.
  • Search Bar: Search for assets by ID, name, description, or partial IP/URL.
  • Add Asset: Use the Add asset button to manually add a new asset to your inventory.
  • Create Collection: Use the Create collection button to organize assets into collections. (See Collections [Link] documentation for details.)

Asset Table

The Asset Table lists all assets in your inventory and their associated metadata.

Columns

Column Description Sortable
Asset Name Displays the asset identifier (domain, IP, web application, etc.). Click to open asset details. Yes
Status The workflow state of the asset (New, Approved, Rejected, Deprecated, Investigate). Yes
Tags Labels applied for grouping, categorization, or tracking. No
UUID A unique system-generated identifier, useful for automation and API lookups. No
Security Programs Number of Security Programs the asset is assigned to. Yes
Risk Score Numeric score (0–40) indicating asset risk, categorized as Low, Moderate, High, or Critical. Yes
Vulnerabilities Count of vulnerabilities associated with the asset, with a severity distribution bar. No
Criticality Business impact level (Critical, High, Moderate). Yes
Environment Deployment context of the asset (Production, Staging, Development, Test). Yes
Exposure Whether the asset is Internet-facing, Internal-only, or Partner-network-exposed. Yes
First Seen Timestamp when the asset was first discovered. Yes
Last Seen Timestamp when the asset was most recently confirmed. Yes
Created At Timestamp when the asset record was added to the inventory. Yes
Updated At Timestamp when the asset record was last modified. Yes
Discovery Source How the asset was added (Bugcrowd EASM, Data import, Manual entry). Yes

Sorting & Filtering

The Asset Table supports both sorting and filtering for faster navigation.

Sorting

  • Click a column header to sort ascending/descending.
  • Note: All columns are sortable except: Vulnerabilities, UUID, and Tags.

Filters

Available filters include:

  • Type: Zone, Record, Web Application, IP Address, ASN
  • Status: New, Approved, Rejected, Deprecated, Investigate
  • Tags: Filter by labels
  • Coverage: Any, Assigned, Not Assigned
  • Risk Score: Critical (31–40), High (21–30), Moderate (11–20), Low (0–10)
  • Domain Type: Primary or Non-primary
  • Vulnerabilities: Filter by priority (P1-Critical, P2-Severe, P3-Moderate, P4-Low)
  • Created At: Filter by creation date/time range
  • Updated At: Filter by last updated date/time range

Bulk Actions

You can take actions on one or more selected assets:

  • Assign to Security Program: Add assets to a Bugcrowd Security Program
  • Add to Collection: Group assets into collections for tracking
  • Approve / Reject: Manage workflow state
  • Archive: Move assets out of active inventory

Bulk Actions

Row-Level Actions (⋮ menu)

Each asset row also includes additional actions:

  • Unmark as Primary domain (only displays if a zone is designated as a primary domain)
  • Edit tags
  • Edit (enables you to edit asset details)
  • Assign/remove from Security Program
  • Add to collection
  • Archive asset

Row-Level Actions

Example Workflows

Search and Approve a New Asset

  1. Use the search bar to find the asset by UUID, domain, or IP.
  2. Select the asset from the table.
  3. Click Approve to move it into the approved state.

Find Highest-Risk Assets

  1. Open the Risk Score filter.
  2. Select Critical (31–40).
  3. Review the highest-priority assets first.

Bulk Assign to a Program

  1. Select multiple assets using checkboxes.
  2. Click Assign to Security Program.
  3. Choose one or more target programs.

Tips

  • Use Tags to organize assets across teams, environments, or initiatives (e.g., Production, Website Testing, Bug Bounty).
  • Combine filters (e.g., Risk Score: Critical + Environment: Production) to quickly identify high-priority targets.