Versions Compared
Key
- This line was added.
- This line was removed.
- Formatting was changed.
This section will guide you through the vulnerabilities dashboard of Kiuwan Code Security.
Contents:
Table of Contents |
---|
The
Table of Contents |
---|
Code Security Vulnerabilities
...
dashboard provides a detailed view of
...
the application’s vulnerabilities
...
. It allows you to:
- Search for vulnerabilities according to multiple search criteria
- Order and group vulnerabilities by different characteristics
- Inspect details of every single vulnerabilities
- Access to vulnerability description and remediation tips
...
Image Added
Summary data
...
The summary section displays group information on vulnerabilities:
- By Vulnerability Type: number of vulnerabilities for every type (please see Vulnerability Types )
- By Language: number of vulnerabilities found for every programming language
- By Priority: number of vulnerabilities found by priority (according to security rules priorities as defined in the model used for the analysis)
Figures are also displayed for
- Violated Rules: number of security rules (checks) with associated vulnerabilities
- Vulnerabilities: total number of vulnerabilities found in app source code
- Very High: number of Very High vulnerabilities
- Security Rating: overall application security rating
Image Modified
...
Click the
...
burger menu on the top-left
...
to:
- Compare analysis results with any other analysis
- Mute vulnerabilities
- Export vulnerabilities to CSV format
- Export to ThreadFix
...
- Export in PDF format
Image Added
Detailed data
Along with these metrics, Vulnerability page displays a full
...
list of defects that you can browse, filter and order by following criteria:
...
Image Added
- Search by rule name
- Priority - low to high
- Characteristic - main
...
- software analytics categorization of the selected rule
- Vulnerability Type
...
- - security topic addressed by the selected security rule
...
- Language
...
- - programming language
- Normative - security standard
- CWE Scope
- Framework
- Tags
- Muted - muted rules or not
- Status - reviewed or not
You can also group by Rule or Files
Click on a vulnerability row to see more details:
Image Added
- Which files contain this vulnerability
- The specific location of the vulnerability in the source code
Info |
---|
For further information, please visit Understanding Data-Flow Vulnerabilities |
Image Removed
Clicking on a vulnerability row will let you drill down to detail on security rule (from general description to the specific line of the vulnerability in a source file).
...