View SCA Findings

SCA findings are displayed in the SCA tab of your Radar project. Each finding represents a known vulnerability (CVE) in one of your project's dependencies, with severity information, affected package details, and remediation guidance.


ByteHide Radar SCA findings table showing 112 total detections with severity breakdown, Status and Severity filters, CVE entries with fingerprint, title, severity badge, status, location in package-lock.json, and context menu with View details, Mark as ignored, and Mark as false positive optionsClick to expand

Unlike SAST findings which identify vulnerabilities in code you wrote, SCA findings identify vulnerabilities in third-party packages. The remediation approach differs: instead of fixing code, you typically upgrade to a patched version.


Accessing SCA Findings

  1. Sign in to ByteHide Cloud and open your Radar project
  2. Click the SCA tab in the project navigation bar
  3. The findings table displays all detected dependency vulnerabilities from the most recent scan

If no findings appear, either your dependencies have no known vulnerabilities or a scan has not yet completed. Use the Scan Project button to trigger a manual scan.


Findings Table Columns

ColumnDescription
FingerprintUnique tracking ID assigned by Radar. Remains consistent across scans so you can track a vulnerability through its lifecycle
TitleCVE identifier and vulnerability name (e.g., "CVE-2023-44270 - PostCSS line return parsing error"). Click to open the detail panel
SeverityBased on CVSS score: Critical (9.0-10.0), High (7.0-8.9), Medium (4.0-6.9), Low (0.1-3.9)
StatusOpen (unresolved), Fixed (no longer detected), Ignored (dismissed by team), False Positive (marked incorrect, rare for SCA)
LocationPath to the manifest or lock file where the vulnerable dependency was found, with a link to the file on GitHub
Last SeenTimestamp of the most recent scan that detected this vulnerability
AutoFixWhether Radar can generate a PR to upgrade the dependency. See AutoFix

Filtering Findings

The SCA tab provides Status and Severity filters to focus on what needs attention.

  • Status: filter by Open, Fixed, Ignored, or False Positive to narrow the list
  • Severity: filter by Critical, High, Medium, or Low based on CVSS scores

SCA vs SAST Filters

SCA findings use CVE identifiers and CVSS severity scores from the National Vulnerability Database, not CWE or OWASP filters. This is because SCA vulnerabilities are cataloged in standardized databases with established severity ratings.


Finding Detail

Clicking a finding opens the detail panel with full vulnerability information.

ByteHide Radar SCA finding detail showing CVE-2021-44906 minimist prototype pollution with 95% Critical confidence score, General tab active, description, location in package-lock.json with code snippet, and upgrade recommendation with Create PR to fix buttonClick to expand

The detail panel has four tabs:

TabContent
GeneralCVE ID and description, affected package and version, fixed version, CVSS breakdown (Attack Vector, Complexity, Privileges, User Interaction, impact on Confidentiality/Integrity/Availability), and upgrade recommendation
AI ExplanationPlain-language analysis of the vulnerability, exploitation risk, and step-by-step remediation guidance. See AI Explanation
Autofix With AIGenerate a pull request that updates the vulnerable dependency to the minimum safe version. Radar updates the manifest and lock files automatically. See AutoFix
ActivityHistory of status changes, scans, and team actions on this finding

ByteHide Radar SCA finding Autofix With AI tab showing CVE-2021-44906 minimist prototype pollution with 95% Critical score and Create PR to fix button to automatically generate a pull request that upgrades the vulnerable dependencyClick to expand


SCA vs SAST Findings

AspectSAST FindingsSCA Findings
SourceVulnerabilities in your own codeVulnerabilities in third-party packages
IdentifiersCWE, OWASP Top 10CVE identifiers
Severity basisRadar's AI confidence scoringCVSS scores from NVD
RemediationFix the code in your repositoryUpgrade or replace the dependency
AutoFixAI-generated code patchDependency version upgrade PR
False positivesPossible (code context matters)Rare (CVE data is authoritative)

Next Steps

SCA Triage and Remediation

Prioritize, triage, and remediate SCA findings effectively.

CVE Reference

CVE identifiers, CVSS scoring, and the vulnerability databases Radar uses.

Supported Ecosystems

Package ecosystems and manifest formats analyzed by Radar's SCA engine.

Previous
Supported Ecosystems