Skip to Content
Getting StartedRun Your First Scan

Run Your First Scan

Triggering a Scan

There are several ways to start a scan:

From the Repositories Page

  1. Go to Dashboard → Repositories
  2. Find the repository you want to scan
  3. Click the Scan button
  4. Choose your scan type:
    • Smart Scan — Fast, focused on common vulnerabilities
    • Deep Scan — Comprehensive, includes all scanners + AI enrichment
  5. Click Start Scan

Automatic First Scan

If you imported repositories during onboarding, CodeStax automatically triggers your first scan using the scan type you selected in the wizard.

Scan Progress

Once a scan is triggered:

  1. Queued — The scan is waiting for a scanner to become available
  2. In Progress — Scanners are actively analyzing your code
  3. Completed — Results are ready for review

The dashboard auto-refreshes every 5 seconds so you can see progress in real time.

Timeout: Scans that remain in a pending or running state for more than 35 minutes are automatically marked as failed.

Understanding Scan Results

Navigate to Dashboard → Scans to see all scan results.

Scan Summary

Each completed scan shows:

  • Repository name and scan type (Smart/Deep)
  • Status — Clean (no issues), or the number of issues found
  • Severity breakdown — Critical, High, Medium, Low
  • Scan duration

Issue Details

Click on a scan to see detailed findings:

FieldDescription
SeverityCritical, High, Medium, or Low
TitleBrief description of the vulnerability
FileFile path and line number where the issue was found
ScannerWhich scanner detected it (Semgrep, Trivy, etc.)
CWECommon Weakness Enumeration reference
CVSS ScoreStandardized severity score (0-10)
EPSS ScoreExploit Prediction Scoring (probability of exploitation)
RemediationAI-generated fix suggestion with code examples

Security Score

After your first scan, you’ll see a Security Score (0-100) on the dashboard:

  • 80-100 — Excellent
  • 50-79 — Good, but has areas to improve
  • Below 50 — Needs attention

This score is calculated from your compliance posture across all scanned repositories.

What Gets Scanned

Smart Scan Tools

ToolWhat It Checks
SemgrepOWASP Top 10, injection flaws, XSS, insecure crypto, auth issues
RuffPython code quality and security patterns
BanditPython-specific vulnerabilities (SQL injection, hardcoded passwords, etc.)
ESLintJavaScript/TypeScript security anti-patterns

Deep Scan (adds)

ToolWhat It Checks
TrivyKnown CVEs in npm, pip, Maven, Go, and 5 more package ecosystems
GitleaksAPI keys, passwords, tokens, private keys in your codebase
CheckovTerraform, Kubernetes, CloudFormation, and Dockerfile misconfigurations
HadolintDockerfile security best practices
AI EnrichmentLLM-powered remediation advice for every finding
CVSS/EPSS ScoringIndustry-standard vulnerability scoring
Vulnerability CorrelationDeduplication and attack chain detection

Test File Filtering

CodeStax automatically excludes test and fixture files to reduce false positives. This includes files matching common patterns for:

  • pytest, unittest, Jest, Mocha, Jasmine
  • Storybook stories
  • Cypress, Playwright, RSpec
  • Mock and fixture directories