How It Works
Deterministic SAST uses pattern matching and rule-based detection:- Pattern matching: Identifies known vulnerable code patterns
- Dataflow analysis: Tracks untrusted data through code
- Control flow analysis: Identifies unsafe execution paths
- Semantic understanding: Analyzes code structure and meaning
What Deterministic SAST Finds
- Injection flaws: SQL injection, command injection, code injection
- Cross-Site Scripting (XSS): Reflected, stored, DOM-based
- Authentication issues: Broken auth, session management flaws
- Authorization flaws: Missing access controls, insecure direct object references
- Cryptographic issues: Weak algorithms, insecure random number generation
- Security misconfigurations: Debug mode enabled, default credentials
- Input validation: Missing or improper validation
- Path traversal: Directory traversal vulnerabilities
Language Support
Deterministic SAST supports 27+ languages with comprehensive rule coverage. Deep coverage (100+ rules each):- Python (334 rules) - Django, Flask, FastAPI
- Terraform (362 rules) - AWS, Azure, GCP, Kubernetes
- JavaScript (173 rules) - React, Vue, Angular, Node.js
- Java (121 rules) - Spring, Jakarta EE
- YAML/Kubernetes (120 rules) - K8s manifests, Helm charts
- Ruby (92 rules) - Rails, Sinatra
- Go (76 rules) - Gin, Echo, standard library
- PHP (61 rules) - Laravel, Symfony, WordPress
- C# (51 rules) - ASP.NET, .NET Core
- Solidity (50 rules) - Smart contracts
False Positive Elimination
The False Positive Elimination agent analyzes deterministic SAST results to reduce false positives by understanding code context:- Validates input sanitization before vulnerable sinks
- Recognizes framework-specific security protections
- Traces dataflow to verify exploitability
- Filters violations that aren’t actually exploitable
Agentic SAST
Agentic SAST performs deep code analysis using graph-based analysis to identify logic flaws, authorization issues, and design failures that deterministic SAST cannot detect. Learn more about Agentic SAST →Configure deterministic SAST scanning in repository settings:
- Enable/disable SAST scanning
- Select rulesets to apply
- Configure scan paths and exclusions
- Set severity thresholds
- Enable false positive elimination
