SAST Scanner
Table of Contents
Purpose
TBD
Quick Start
For detecting code security vulnerabilities with sources in current directory, the command:
uploads the result to Xygeni platform.
SAST scanner can be launched in two different ways:
1.- By its own specific command ( xygeni sast [options]
)
2.- By the general command ( xygeni scan --run="sast" [options]
)
For exporting the most important misconfigurations to CSV for review, or importing the findings into another tool:
Usage
The SAST Scanner is launched using the xygeni sast [options]
command.
For a full reference of all the available option, you can issue :
The most important properties are:
Name of the project,
-n
or--name
.Input, either a directory (
-d|--dir
) or a repository (-repo|--repository
). If none given, the local current directory is assumed.Upload results to the service,
--upload
. By default, results are not uploaded.Output file (
-o
or--output
) and format (-f
or--format
). If not output file (or stdout / - are used), the standard output is used. Use--format=none
for no output.The detectors to run could be tailored with the
--detectors
/--skip-detectors
options. A common use-case is to consider only issues with high or critical severity with--detectors=high
.
Last updated