Skip to content

Managing Findings

Findings are security issues discovered during scans. The findings workflow lets you triage, track, and resolve vulnerabilities across all your repositories.

Findings List

Navigate to Findings in the sidebar to see all findings. The table shows:

ColumnDescription
SeverityColor-coded badge: Critical (red), High (orange), Medium (yellow), Low (green)
TitleShort description of the vulnerability (clickable)
TypeSAST, SBOM, CVE, GDPR, or OAuth
ScannerTool that found the issue (e.g. semgrep, syft)
FileSource file path where the issue was found
StatusCurrent triage status

Filtering

Use the filter bar at the top to narrow results:

  • Repository — Filter to a specific repository or view all
  • Severity — Critical, High, Medium, Low, or Info
  • Type — SAST, SBOM, CVE, GDPR, OAuth
  • Status — Open, Triaged, Resolved, False Positive, Ignored

Filters can be combined. Results are paginated with 20 findings per page.

Finding Detail

Click any finding title to view its full detail page, which includes:

Metadata

  • Severity level with CWE identifier and CVSS score (when available)
  • Scanner tool and scan type
  • File path and line number

Description

Full explanation of the vulnerability, why it's a risk, and what conditions trigger it.

Code Evidence

The source code snippet where the issue was found, with syntax highlighting and the file path.

Remediation

Step-by-step guidance on how to fix the vulnerability.

Suggested Fix

A code example showing the corrected implementation.

Linked Issue

If the finding was pushed to an issue tracker (GitHub, GitLab, Jira), a direct link to the external issue.

Updating Status

On the finding detail page, change the finding's status using the status buttons:

StatusWhen to Use
OpenNew finding, not yet reviewed
TriagedReviewed and confirmed as a real issue, pending fix
ResolvedFix has been applied
False PositiveFinding is not a real vulnerability in this context
IgnoredKnown issue that won't be fixed (accepted risk)

Status changes are persisted immediately.

Severity Levels

SeverityDescriptionTypical Examples
CriticalImmediate exploitation risk, data breach likelySQL injection, RCE, hardcoded secrets
HighSerious vulnerability, exploitation probableXSS, authentication bypass, SSRF
MediumModerate risk, exploitation requires specific conditionsInsecure deserialization, weak crypto
LowMinor risk, limited impactInformation disclosure, verbose errors
InfoInformational, no direct security impactBest practice recommendations

Compliance Scanner Documentation