Skip to main content

Overview

Backline Assistant is an in-product, context-aware AI companion designed to help you understand and investigate security insights directly inside Backline. It allows you to ask questions in natural language, explore vulnerabilities and remediations, and receive explainable answers based on:
  • Backline’s security knowledge base
  • Your organization’s environment and findings
  • Integrated external sources (when relevant)
The assistant is designed to support decision-making and investigation—not to automatically change data or perform destructive actions.

Typical Use Cases

The Assistant is accessible from the application header and is intended for open-ended questions and multi-topic investigations:
  • “Show me the highest-risk remediations this week”
  • “Which vulnerabilities are about to breach my SLA?”
  • “Show me all my remediations that are waiting for approval”
This mode is ideal when you want to explore across multiple vulnerabilities, remediations, or domains.

Access & Layout

1

Open the Assistant

Click the assistant button in the application header.
2

Floating Mode

When a side panel is already open (Vulnerability or Remediation), the assistant appears as a floating button above it.
3

Expand View

Use the Expand option to switch to a full-page assistant view for deeper investigations.

Conversations & History

New Chat

Selecting New Chat starts a fresh conversation. The previous conversation is automatically saved to history.

Chat History

  • All completed chats are stored in your Chat History panel
  • You can reopen previous conversations at any time
  • Chats persist across user sessions

Asking Questions

Input Behavior

ActionResult
EnterSends the message
Shift + EnterCreates a new line
Empty fieldSend button is disabled
The input field supports multi-line messages for complex questions.

Suggested Questions

When opening a new chat, the assistant may display starter suggestions:
  • What are the top 10 critical vulnerabilities in my environment right now?
  • Which remediations are about to breach SLA or already overdue?
  • Which remediations are waiting for pending approval?

Context Chips (@ Mention)

Typing @ in the input box opens a selector that allows you to attach context:
Context TypeDescription
VulnerabilitiesAttach specific vulnerabilities for focused analysis
RemediationsAttach remediations to discuss upgrade paths or impacts
Rules:
  • Maximum 5 chips per chat
  • Searchable by title
  • Context chips help the assistant provide more precise and relevant answers
Each assistant response ends with 1–3 recommended step chips. These help you continue your investigation efficiently.

Investigation Steps

Examples of recommended actions:
  • “See related remediations”
  • “Show dependency path”
  • “Explain this CVE”
Clicking a step automatically moves it into the input box for quick follow-up.

What You Can Ask

The assistant is optimized for security analysis, investigation, and triage:

Vulnerability Investigation

  • Exploitability explanations and evidence
  • Severity reasoning
  • Impact assessment

Remediation Guidance

  • Breaking changes summary
  • Safe upgrade paths
  • Dependency analysis

Risk & Prioritization

  • SLA risks
  • High-impact remediations
  • Priority recommendations

Environment Analysis

  • Cross-repository insights
  • Trend analysis
  • Compliance status

Limitations

The assistant is view-only and advisory. It cannot perform actions that modify your data.
The assistant cannot:
RestrictionDescription
Modify dataCannot modify or delete vulnerabilities or remediations
Change settingsCannot change SLA values or configurations
Cross-tenant accessCannot perform cross-tenant analysis
Data boundariesCannot access data outside your tenant
Execute codeCannot execute code or infrastructure changes

Best Practices

When asking about specific vulnerabilities or remediations, use @ mentions to attach them. This helps the assistant provide more accurate and relevant responses.
Don’t start from scratch every time. Reopen previous conversations to continue investigations or reference past findings.
Instead of “Show me vulnerabilities,” try “Show me critical vulnerabilities in production repositories that are about to breach SLA.”