Performing a static code analysis
Static code analysis includes the use of various security and quality tools, such as:
SAST (Static Application Security Testing) tools
Secrets scanning
Dependency checks (SCA)
Infrastructure as Code (IACS) scanners
Scan Types Supported
The system supports both on-demand (single) and scheduled scans. Additionally, you can configure repository monitoring to periodically check for updates in a target repository and automatically perform incremental scans on any new changes.
Step-by-Step Instructions
1. Create a Product
Before initiating a scan, create a new product as described on the previous page of the documentation.
2. Provide Source Code
You can supply the source code in one of the following ways:
ZIP Archive: Upload a compressed folder containing one or more source code directories.
Git Repository Path: Specify the repository URL (both HTTPS and SSH formats are supported).
📌 If the repository requires authentication, refer to the next page for setup instructions.
3. Configure the Static Analysis
Navigate to the Static Analysis tab and:
Upload the ZIP archive or enter the Git repository path.
Select the main programming language of the project.
Choose any additional multi-language scanners you wish to include.
ℹ️ Language-specific scanners will automatically be triggered based on the selected Main Language.
4. Submit the Scan
Confirm that the Engagement ID matches the one created during product setup.
Click “Submit” to start the scan.
Last updated