SAST Triage and Remediation

Triaging is the process of reviewing, prioritizing, and deciding how to handle each detected vulnerability. Effective triage ensures your team focuses on the most impactful issues first.


Finding Status

Every finding has a status that tracks its position in the remediation lifecycle:

StatusDescriptionHow it changes
OpenDetected and needs attention. All new findings start hereSet automatically on first detection
FixedNo longer detected in subsequent scansSet automatically when a scan no longer finds the vulnerability. Reopened automatically if it reappears
IgnoredReviewed and intentionally not fixed (unreachable code, accepted risk, compensating control)Set manually with a required justification
False PositiveDetermined to be incorrect after reviewSet manually. Helps improve AI detection accuracy

ByteHide Radar Status filter dropdown showing Open, Fixed, Ignored, and False Positive options for filtering findingsClick to expand


Reviewing a Finding

  1. Open the finding - Click any row in the SAST findings table
  2. Read the description - Understand the vulnerability type and its impact
  3. Examine the code - Review the snippet with the vulnerable line highlighted. Check where user input originates, what validations exist, and how it reaches the sensitive operation
  4. Check CWE and OWASP - Click the badges for the formal weakness definition and prevention strategies
  5. Read the AI Explanation - Switch to the AI Explanation tab for a contextual analysis specific to your code, including the attack scenario and tailored remediation advice

ByteHide Radar SAST finding detail showing Path Traversal vulnerability with 50% Medium confidence score, CWE-22 and OWASP A01:2021 badges, code snippet with highlighted line, description, location, recommendation, and Create PR to fix buttonClick to expand


Changing Status

Manual

Click the three-dot menu on any finding row or in the detail panel header:

ByteHide Radar three-dot actions menu on a finding showing View details, Mark as ignored, and Mark as false positive optionsClick to expand

  • Mark as Ignored - Provide a justification for why the risk is accepted
  • Mark as False Positive - Indicate the finding does not represent a real vulnerability

Automatic

  • Fixed - Applied automatically when a scan no longer detects the vulnerability
  • Reopened - Applied automatically if a previously Fixed finding is detected again

Bulk Actions

Select multiple findings using checkboxes to apply bulk status changes (Mark as Ignored, Mark as False Positive, Export).


Remediation Options

Option 1: Manual Fix

  1. Review the code snippet and remediation guidance
  2. Check the AI Explanation tab for framework-specific recommendations
  3. Implement the fix, commit, and push
  4. The next scan verifies the fix and marks the finding as Fixed automatically

Option 2: AutoFix Pull Request

  1. Open the finding and switch to the Autofix With AI tab
  2. Radar clones the repository, initializes the AI agent, analyzes the vulnerability, and implements the fix
  3. Click Create PR to fix to open a pull request in your repository

ByteHide Radar Autofix With AI tab showing the autofix process steps: Starting autofix, Cloning repository, AI agent initialized, AI analyzing vulnerability, and Implementing security fix with PR Created statusClick to expand

The generated PR includes a summary of changes, security impact analysis, and the specific endpoints secured:

GitHub pull request created by ByteHide Autofix showing Fix path traversal vulnerabilities title, summary of changes, security impact analysis, and endpoints securedClick to expand

See AutoFix for details.

Always Review AutoFix PRs

While Radar's AI generates contextually aware fixes, always review the pull request before merging. Verify it does not break existing functionality and handles edge cases correctly.

Option 3: Accept the Risk

Mark the finding as Ignored with a clear justification. Document any compensating controls. Schedule periodic reviews of ignored findings to reassess.


Prioritization Strategy

PrioritySeverityAction
ImmediateCriticalFix now. Exploitable vulnerabilities leading to system compromise or data breach
Current sprintHighSerious vulnerabilities requiring prompt attention
BacklogMediumExploitable under specific conditions. Plan for regular development cycles
Periodic reviewLowBest practice violations. Address when working on related code

Sprint-Based Remediation

At sprint start, filter by Critical + High severity. Assign findings based on code ownership. Include AutoFix PRs for quick wins. Track Open finding count across sprints to measure security debt reduction.


Activity and Collaboration

The Activity tab on each finding provides:

  • Comments - Share analysis, ask questions, document decisions
  • Status change history - Who changed what, when, and why (with justifications for Ignored/False Positive)
  • Scan history - When the finding was first detected and last seen

This audit trail is valuable for compliance and helps new team members understand past decisions.


Next Steps

AutoFix

AI-generated code fixes opened as pull requests.

AI Explanation

Contextual AI analysis of vulnerabilities.

View SAST Findings

Navigate and filter the SAST findings table.

Previous
View Findings