SAST Tools Mapping
The table below shows the triage and severity status mappings for all of the SAST tools that are supported by Software Risk Manager.
Tools are listed alphabetically. Tool results are mapped to the Software Risk Manager status shown at the top of each column. (A blank cell indicates that an equivalent status value is unavailable or undefined.)
SAST Tools | Critical | High | Medium | Low | Info | Unspecified |
---|---|---|---|---|---|---|
Android Lint1 | Security | Correctness; Correctness: Messages, Fatal; Correctness: Messages, Error; Internationalization, Fatal; Internationalization, Error; Bi-directional Text, Fatal; Bi-directional Text, Error | Correctness: Messages Warning, Performance | Usability, Topography; Usability, Icons; Usability; Accessibility; Internationalization, Warning; Bi-directional Text, Warning | ||
Brakeman | ||||||
Checkmarx (SAST) | 4 | High / 3 | Medium / 2 | Low / 1 | Info / 0, Information | Unspecified, Unknown |
Checkmarx One (SAST) | CRITICAL | HIGH | MEDIUM | LOW | INFO | |
Checkstyle | ||||||
Clang | ||||||
Clang (CodeChecker) | CRITICAL | HIGH | MEDIUM | LOW | STYLE | |
Clippy | error | warning | note / failure-note | help | none | |
CodePeer | high | medium | low | |||
CodeSecure | HIGH | MEDIUM | LOW | |||
CodeSonar-Scrape2 | Red | Yellow | Green | |||
CppCheck | error | performance, warning | portability, style | information | none | |
Coverity | Very High / Critical | Major / High | Moderate / Medium | Minor / Low | Audit, Very Low | |
Coverity On Polaris | critical | high | medium | low | audit | |
42Crunch | 5 | 4 | 3 | 2 | 1 | |
ThunderScan | critical | high | medium | low | informational | |
ErrCheck | all | |||||
error-prone | ||||||
ESLint | ||||||
Fortify3 | impact >= 2.5 and likelihood >= 2.5 | impact >= 2.5 | likelihood >= 2.5 | likelihood < 2.5 and impact < 2.5 | ||
Fortify Software Security Center*** | impact >= 2.5 and likelihood >= 2.5 | impact >= 2.5 | likelihood >= 2.5 | likelihood < 2.5 and impact < 2.5 | ||
Gendarm | ||||||
GitLab Security | critical | high | medium | low | informational | |
GoCyclo | all | |||||
GoLint | ||||||
GoSec | HIGH | MEDIUM | LOW | |||
HCL AppScan Source | critical | high | medium | low | informational | |
HCL AppScan on Cloud (ASoC) | critical | high | medium | low | informational | |
Helix QAC | 7 (Undefined behavior), 8 (Language constraints) | 3 (Important issue), 4 (Local criteria), 5 (Data flow analysis), 6 (Portability) | 2 (Minor issue) | 0 (Information), 1 (Obsolete message), 9 (Error) | ||
IneffAssign | all | |||||
JLint | ||||||
JSHint | all | |||||
Microsoft Code Analysis | ||||||
MobSF | dangerous, insecure, high | medium, warning | normal, signature, info, good | |||
MobFS Scan | ERROR | WARNING | INFO | |||
NDepend | Critical | High | Medium | Low | Info | |
OCLint | ||||||
Orca Security (Secret Scans) | CRITICAL | HIGH | MEDIUM | LOW | INFO | |
Parasoft JTest / C++Test / dotTest | Level 1: Severe Violation; Level 2: Possible Severe Violation | Level 3: Violation | Level 4: Possible Violation; Level 5: Informational | |||
PHPMD | 1, 2 | 3 | 4, 5 | |||
PMD | 1, 2 | 3 | 4, 5 | |||
Polaris | critical | high | medium | low | informational | |
Pylint | ||||||
Rapid Scan SAST | critical | high | medium | low | informational | |
SafeSQL | all | |||||
SARIF | severe / critical | high / error | medium / moderate | low / warning | note / info / informational | |
SATE | 1, 2 | 3 | 4, 5 | |||
Scalastyle | ||||||
Scan@Source | critical | high | medium | low | informational | |
SCARF | ||||||
Semgrep | high | medium | low | |||
SonarQube / SonarCloud | BLOCKER / CRITICAL | MAJOR / HIGH | MEDIUM | MINOR / LOW | INFO | |
SpotBugs / FindBugs | 1 | 2 | 3 | |||
Staticcheck | ||||||
TruffleHog | Verified = true; Verified = false AND Detector name = Oauth, AWS, or Heroku | Verified = false AND Detector Name = PrivateKey | Verified = false AND Detector Name = Generic Secret | Verified = false AND Detector Name = Unspecified | ||
Veracode | 4 | 3 | 2 | 1 | ||
Vet |
SAST Tools | Ignored | False Positive | To Be Fixed | Mitigated | Fixed | Reopened |
---|---|---|---|---|---|---|
Android Lint | ||||||
Brakeman | ||||||
Checkmarx (SAST) | NOT_EXPLOITABLE / 1 | False Positive | URGENT / 3; CONFIRMED / 2 | |||
Checkmarx One (SAST) | ||||||
Checkstyle | ||||||
Clang | ||||||
Clang (CodeChecker) | intentional | false_positive, suppress | confirmed | |||
Clippy | ||||||
CodePeer | not a bug | false positive | ||||
CodeSecure | ||||||
CodeSonar-Scrape** | ||||||
CppCheck | ||||||
Coverity | Intentional, ignore | False Positive | ||||
Coverity On Polaris | DISMISSED INTENTIONAL, DISMISSED OTHER | FALSE POSITIVE | TO BE FIXED | |||
42Crunch | ||||||
ThunderScan | false positive | |||||
ErrCheck | ||||||
error-prone | ||||||
ESLint | ||||||
Fortify*** | suppressed, not an issue | exploitable | ||||
Fortify Software Security Center*** | suppressed, not an issue | exploitable | ||||
Gendarm | ||||||
GitLab Security | ||||||
GoCyclo | ||||||
GoLint | ||||||
GoSec | ||||||
HCL AppScan Source | noise | passed | fixed | reopened | ||
HCL AppScan on Cloud (ASoC) | noise | passed | fixed | reopened | ||
Helix QAC | ||||||
IneffAssign | ||||||
JLint | ||||||
JSHint | ||||||
Microsoft Code Analysis | ||||||
MobSF | ||||||
MobFS Scan | ||||||
NDepend | ||||||
OCLint | ||||||
Orca Security (Secret Scans) | ||||||
Parasoft JTest / C++Test / dotTest | ||||||
PHPMD | ||||||
PMD | ||||||
Polaris | dismissed (any other reason) | dismissed (false positive) | to-be-fixed | |||
Pylint | ||||||
Rapid Scan SAST | ||||||
SafeSQL | ||||||
SARIF | ||||||
SATE | ||||||
Scalastyle | ||||||
Scan@Source | ||||||
SCARF | ||||||
Semgrep | fixed | |||||
SonarQube / SonarCloud | WON'T FIX, SAFE | FALSE POSITIVE | ACKNOWLEDGED | FIXED | REOPENED | |
SpotBugs / FindBugs | ||||||
Staticcheck | ||||||
TruffleHog | ||||||
Veracode | Accept the Risk | Potential False Positive | Reported to Library Maintainer | Mitigate by Design, Mitigate by Network Environment, Mitigate by OS Environment | ||
Vet |
1. Android Lint evaluates risk based on both a category and a severity level. Categories are indicated by an asterisk.
2. CodeSonar reports risk through a combination of a ranking formula and an analysis warning system (red, yellow, green). Software Risk Manager uses the red, yellow, and green statuses to map to high, medium, and low, respectively.
3. Fortify reports risk by creating scores for “impact” and “likelihood.” The combination of these scores is then mapped to the Software Risk Manager severity levels.