Documentation
Security
SAST Scanning
Static Application Security Testing analyzes your source code to find security vulnerabilities without executing the code.
How SAST Works
- QODRYX parses your source code into an Abstract Syntax Tree (AST)
- AI models analyze code patterns for known vulnerability signatures
- Data flow analysis tracks user input through your application
- Results are correlated and deduplicated to reduce noise
- Each finding includes remediation guidance and code examples
Detected Vulnerabilities
Critical
SQL Injection
Detects unsanitized SQL queries
High
XSS (Cross-Site Scripting)
Finds unescaped user input in HTML
High
Path Traversal
Identifies file path manipulation
Critical
Command Injection
Detects shell command vulnerabilities
High
Insecure Deserialization
Finds unsafe object deserialization
High
SSRF
Server-Side Request Forgery detection
Medium
XXE
XML External Entity vulnerabilities
High
Hardcoded Credentials
Finds embedded passwords and keys
Running a SAST Scan
# Via CLI
qodryx scan --type sast ./srcOr trigger scans automatically on every push via the dashboard settings.