Reports
ByteHide Radar generates downloadable security reports that summarize your project's findings, scan history, and overall security posture. Reports are useful for compliance documentation, management reviews, and audit trails.
Download Report
- Navigate to your Radar project dashboard or project settings page
- Click the "Download Report" button
- The report is generated on-demand with the latest scan data and downloaded as a PDF
Report generation typically takes a few seconds. The PDF is formatted for professional presentation and can be shared directly with stakeholders and auditors.
Report Contents
| Section | What It Includes |
|---|---|
| Executive Summary | Total finding count by severity, overall security score, open vs. fixed metrics |
| SAST Findings Summary | Vulnerability categories detected, top CWE identifiers with counts, OWASP Top 10 coverage |
| SCA Findings Summary | CVE count by severity, affected packages with current and recommended versions, dependency risk assessment |
| Secret Findings Summary | Types of secrets detected (API keys, passwords, tokens, private keys), remediation status, locations |
| Scan History | Dates and timestamps of each scan, finding counts per scan, identification of scans introducing new findings |
| Trend Analysis | Finding count trends by severity, remediation velocity, new findings vs. fixed per scan cycle |
Scan History
The scan history table in project settings provides a monthly breakdown:
| Column | Description |
|---|---|
| Month | The calendar month |
| Scans | Total number of scans performed |
| SAST | SAST finding count |
| SCA | SCA finding count |
| Secrets | Secret finding count |
| Total | Combined count across all types |
Using Reports for Compliance
| Framework | How Radar Reports Help |
|---|---|
| SOC 2 | Demonstrates regular security testing and remediation tracking. Scan history provides evidence of continuous monitoring |
| ISO 27001 | Vulnerability classification and remediation tracking align with vulnerability management and risk assessment requirements |
| PCI DSS | Documents static analysis coverage for common coding vulnerabilities as required by Requirement 6 |
| OWASP Coverage | OWASP Top 10 mapping shows which risk categories have been evaluated with finding counts |
| CWE Classification | Standardized CWE references help auditors verify testing covers expected vulnerability categories |
Report Freshness
Reports reflect findings at the time of generation. For the most up-to-date information, generate a new report after running a scan. Previous reports are not automatically updated.
Next Steps
Dashboard Overview
Radar dashboard for real-time statistics and vulnerability trends.
Project Settings
Configure your Radar project, manage tokens, and access scan history.