Remediation Reports
Promptfoo Enterprise automatically generates remediation reports after each red team scan. These reports provide actionable security recommendations with implementation guidance.
Overview
Remediation reports analyze your scan results and provide:
- Executive Summary: High-level assessment of your security posture with top concerns
- Vulnerability-to-Remediation Mapping: Quick reference showing which fixes address which vulnerabilities
- Prioritized Action Items: Step-by-step implementation guidance ordered by impact and effort
- Code Examples: Ready-to-use code snippets and configuration changes
- Attack Context: Real examples from your scan showing how vulnerabilities were exploited
Accessing Remediation Reports
Remediation reports are automatically generated when:
- A red team scan completes in the Promptfoo Enterprise UI
- A CLI scan is uploaded to the server using
promptfoo share
To access a remediation report:
- Navigate to the Reports section in Promptfoo Enterprise
- Select the evaluation you want to review
- Click on the Remediation tab to view the remediation report

Alternatively, you can access remediation reports directly from the vulnerabilities view by clicking on a specific finding.
Report Structure
Executive Summary
The executive summary provides a high-level overview of your security posture, including:
- Overall Risk Level: Critical, High, Medium, or Low classification
- Top Concerns: The most significant security issues identified in your scan
- Security Posture: Narrative summary of your application's current security state
This section helps stakeholders quickly understand the severity of issues without diving into technical details.
Vulnerability-to-Remediation Mapping
A quick-reference table showing:
- Vulnerability category and plugin ID
- Number of failed test cases
- Risk score and severity level
- Which remediation actions address each vulnerability
This mapping helps you understand the relationship between vulnerabilities and fixes, making it easier to prioritize work that addresses multiple issues.
Prioritized Action Items
Each action item includes:
- Priority Number: Actions are ranked by impact and feasibility
- Action Type: Category of fix (e.g., System Prompt Hardening, Input Validation, Output Filtering)
- Title and Description: Clear explanation of what needs to be changed
- Impact Level: Expected security improvement (High, Medium, Low)
- Effort Level: Implementation difficulty (High, Medium, Low)
- Implementation Details: Step-by-step instructions with code examples
- Estimated Timeframe: How long implementation should take
- Vulnerabilities Addressed: Which security issues this action will fix

Action Types
Common remediation action types include:
- System Prompt Hardening: Strengthening your system prompts with better guardrails
- Input Validation: Adding validation to user inputs before processing
- Output Filtering: Implementing filters to sanitize model responses
- Configuration Changes: Adjusting model parameters or API settings
- Architecture Changes: Modifying your application's structure for better security
Attack Examples
For each vulnerability addressed by a remediation action, the report shows:
- The actual adversarial probes that succeeded during your scan
- The model's vulnerable responses
- Why the test was marked as a failure
This context helps you understand the real-world exploitation of each vulnerability and verify your fixes are effective.
Using Report Features
Regenerating Reports
If your scan data has changed or you want fresh recommendations:
- Click the Regenerate button in the report header
- The report status will change to "Generating"
- The page will automatically poll and update when generation completes
Report generation typically takes 1-3 minutes depending on the size of your scan.
Downloading Reports
To share reports with your team or stakeholders:
- Click the Download PDF button in the report header
- The report will be formatted for printing and opened in a print dialog
- Save as PDF or print directly
The PDF format is optimized for sharing with technical and non-technical audiences.
System Prompt Hardening
For system prompt vulnerabilities, use the Harden Prompt feature:
- Click the Harden Prompt button in the report header
- Review the AI-generated hardened prompt that addresses identified vulnerabilities
- Test the hardened prompt against your scan results
- Copy and implement the improved prompt in your application

This feature provides immediate, actionable improvements to your system prompts based on the specific vulnerabilities found in your scan.
Report Statuses
Remediation reports can be in different states:
- Pending: Report generation has been queued but not started
- Generating: The AI is currently analyzing your scan and creating recommendations
- Completed: Report is ready to view
- Failed: Generation encountered an error (use Regenerate to retry)
The report page automatically polls for updates while a report is generating, so you don't need to refresh manually.
Outdated Reports
If you run a new scan after a remediation report has been generated, the report will be marked as Outdated. An alert will appear prompting you to regenerate the report to include the most recent results.
Regenerating ensures your remediation recommendations reflect your current security posture.
Best Practices
Implementation Workflow
- Review Executive Summary: Understand overall risk and top concerns
- Check Vulnerability Mapping: Identify which fixes provide the most coverage
- Start with High Impact, Low Effort: Address quick wins first
- Implement Changes Incrementally: Fix one action item at a time
- Re-scan After Each Fix: Verify your remediation was effective
- Track Progress: Use the vulnerabilities page to mark findings as fixed
Prioritization Strategy
Consider both impact and effort when prioritizing:
- High Impact, Low Effort: Implement these first for immediate security gains
- High Impact, High Effort: Plan these as longer-term initiatives
- Low Impact, Low Effort: Good candidates when you have spare capacity
- Low Impact, High Effort: Deprioritize unless required for compliance
Verification
After implementing remediation actions:
- Run a new scan with the same configuration
- Compare the new report to the previous one
- Verify that addressed vulnerabilities no longer appear
- Check if the overall risk level has improved
- Generate a new remediation report to identify remaining issues
Integration with Findings Workflow
Remediation reports complement the vulnerabilities workflow:
- Vulnerabilities Page: Track individual findings across scans
- Remediation Reports: Get implementation guidance for fixes
- Reports Page: Review point-in-time scan results
Use remediation reports to understand how to fix issues, then track your progress in the vulnerabilities page.