Written code Scan (SAST)

For SAST Scans users need to follow the mentioned steps.

We can start an online scan by clicking on the SCAN button on top right

We chose Github for this example. Once clicked, you get a repo to scan. For the demonstration purpose we take Vulnado.

We clone the repo and paste it like,

Hit the green plus sign and scan.

Scan with start

Once online scans finishes we get the result like following

Above picture shows that we scanned a project names “vulnado-test” which has our Code Analysis (SAST) and other scans. Let’s dive into that.

Once you click on it you will be redirected to a page like following

Which will contain the following information about your SAST scan

Named of our current project. In this case vulnado-test

When scan was performed, on which date and at what time

Which user performed this scan? We show their email address

Which rules matched our sets of backend rules. We show that

Code block which is vulnerable

More information about the ruleid

Vulnerable code file path

Last updated