CodeThreat - Knowledge Center
CodeThreatGithub
  • Latest
    • v2409 Cloud Upgrades, Repo Monitoring, Path Exclusion, and New JS/TS Rulesets
  • Product Updates
    • v2402 GenAI, Sarif and New Language Supports
    • v2401 SCA Release
    • v2311.30
    • v2310.29
    • v2309.30
    • v2308.30
    • v2307.25
    • v2306.26
    • v2305.26
    • v2304.23
  • Privacy Policy
  • Terms of Service
  • Company Handbook
  • Usage Guide
    • API Documentation
    • CT Server Installation
      • Deploy with Docker
      • Self-Hosted Server Setup
      • Installation
    • Introducing CodeThreat
    • Create a CodeThreat Account
    • Quick Start & Scan
    • HomePage
    • Projects
      • Overview
      • Scans
      • SCA(Software Composition Analysis)
      • Licences
      • Dependency Tree
      • Project Structure
      • Report
    • Issues
      • Issue List
      • Issue List Filter
      • Issue Detail
    • Integrations
      • Azure
      • Github
      • Gitlab
      • Jira
    • CI-CD Integrations
      • GitHub Actions
      • Jenkins
      • Gitlab
      • Bamboo
      • Azure
    • Notifications
    • Settings
      • General
      • SMTP
      • License
      • OAUTH Apps
        • Azure
        • Github
        • GitLab
      • Organizations
      • Scan Policy
      • Users & Groups
      • Notifications
      • Access Token
Powered by GitBook
On this page

Was this helpful?

  1. Usage Guide
  2. Issues

Issue List

Detected vulnerabilities are displayed in a tree-like structure, giving users an organized overview.

PreviousIssuesNextIssue List Filter

Last updated 1 year ago

Was this helpful?

  • Default Grouping: By default, vulnerabilities are grouped by programming language, followed by the vulnerability name. For instance: Python -> SQL Injection.

  • Custom Grouping: Users also have the option to group vulnerabilities by programming language followed by the file in which the vulnerability was detected, for example: Python -> main.py.

Filtering Options:

At the top of the page, users can filter the vulnerabilities based on certain criteria.

By using the filter, users can choose to view vulnerabilities specific to certain programming languages. This feature is beneficial when users are more concerned about vulnerabilities in a particular set of languages.

Grouping Selection:

Users have the flexibility to modify how the vulnerabilities are grouped.

  1. Navigate to the list at the top of the page.

  2. Choose between "Severities" or "Platform" as the primary grouping method. This will reorganize the displayed vulnerabilities accordingly.

Notes:

  • The Issues Page is designed to offer users an intuitive and organized overview of all detected vulnerabilities.

  • Using the filtering and grouping functionalities can help users prioritize and address the most critical issues first, especially in cases where there are numerous findings.

  • It's advised to periodically review the Issues Page after scans to understand the security posture of the codebase and take necessary remediation actions.