Hexamind

Docs

Search docs...

⌘K
ENRequest Access
Documentation
  • Getting Started

  • TrustBOM

    • Concepts

    • Sign & Share

    • TrustObjects

    • Certificates

    • External Verify

  • Hexamind AI

    • Concepts

    • AI Advisor

    • Analysis Panel

    • Reports

  • Security Advisory

    • Terms & Concepts

    • Projects

    • Vulnerability Audit

    • Environments

  • Compliance

    • Security Baseline

    • License Management

    • Vulnerability DB

  • Security & Policy

    • Security Architecture

    • AI Analysis & Data Security

    • VDP

  • Regulations

  • FAQ

Back to Home

Contact

Getting Started
~10 min read

Getting Started

This guide walks you from signup to your first software vulnerability analysis. Even first-time teams can follow the workflow easily.

Early Access Notice

The platform is currently in Early Access, so you can explore the major capabilities more broadly.

1. Sign Up

Hexamind Platform offers separate onboarding flows for individual users and organizations. Your experience on the platform varies based on the account type you choose.

Individual User Signup

1
Open the Signup Page

Open the signup page from the landing page.

2
Sign Up with Social or Email

Sign up using a social account or email and password.

3
Add Optional Profile Info

Set up a basic profile by selecting your role and intended use.

After Social Signup

Social signups let you get started quickly. A brief onboarding flow may follow on first login.

Business or Institutional Signup

1
Choose Business Signup

Select the business or organization option on the first signup screen.

2
Enter Contact Information

Create the account using your work email address.

3
Enter Organization Information

Enter organization details including company name and contact information.


2. Verify Your Email

If you signed up with email, a verification link will be sent. Click the link to complete verification.

Did not receive the email?

Check your spam folder or use the resend option. Contact support if the issue persists.

• Check spam or junk folders

• Confirm the email address you entered

• Request a resend

• Contact support if needed


3. Understand the Dashboard

After login, the security dashboard gives you an at-a-glance view of project status across the platform.

🏅

Security score: a score and grade that summarize overall project risk

📁

Project status: number of registered projects and how many contain vulnerabilities

⚠️

Vulnerability summary: distribution of Critical, High, Medium, Low, and KEV issues

🧩

Component status: number of analyzed components and the ratio of vulnerable ones

⚡

Quick Actions: shortcuts for creating projects, uploading SBOMs, reviewing vulnerabilities, and generating reports


4. Create Your First Project (RSBOM Wizard)

Start the four-step project creation wizard from the New Project action on the dashboard or from Security Advisory → Project.

1
Enter System Information

Enter system information such as name, version, type, and environment linkage.

2
Upload SBOM and Analyze

Upload the SBOM and choose Quick Scan or Full Scan based on the depth you need.

3
Apply Security Guidance
Optional

Apply security guidance by linking baseline or policy material when needed.

4
Finish and Wait for Analysis

Finish and wait for analysis while the platform processes the project in the background.


5. Review Your First Analysis

Once analysis is complete, the project view lets you review security overview, vulnerability list, component status, baselines, environment links, and activity history in dedicated sections.

Severity Bands

Critical: CVSS 9.0-10.0

High: CVSS 7.0-8.9

Medium: CVSS 4.0-6.9

Low: CVSS 0.1-3.9

What to Do Next

Open individual vulnerability items and use Hexamind AI alongside to dig deeper into prioritization and patch direction.

Account and Subscription Management

Use My Account to manage your profile, security settings, and subscription.

Profile: basic information and preferences

Security: account security settings

Subscription: active plan and billing information

What to Do Next

→ Sign and deliver artifacts with TrustBOM→ Talk through analysis with Hexamind AI→ Start auditing vulnerabilities in Security Advisory→ Review the regulations matrix
Next

TrustBOM