Skip to Content
ScanningUnderstanding Results

Understanding Scan Results

Scan History

Navigate to Dashboard → Scans to view all your scans.

Summary Statistics

At the top of the page, you’ll see:

  • Total Scans — All scans across your workspace
  • Completed — Successfully finished scans
  • In Progress — Currently running scans
  • Total Issues — Sum of all findings

Scan Table

Each scan shows:

ColumnDescription
RepositoryName of the scanned repository
StatusClean, N Issues, In Progress, or Error
TypeSmart Scan or Deep Scan
DurationHow long the scan took
DateWhen the scan was triggered

Status badges are color-coded:

  • 🔵 Blue — Clean (no issues)
  • 🟡 Amber — In progress
  • 🔴 Red — Issues found or scan failed

Finding Details

Each vulnerability finding includes:

Severity Levels

LevelColorDescription
CriticalRedExploitable vulnerabilities requiring immediate action
HighOrangeSerious vulnerabilities that should be fixed soon
MediumYellowModerate risk, should be addressed in next sprint
LowBlueMinor issues, fix when convenient

Finding Fields

  • Title — What the vulnerability is
  • Description — Detailed explanation
  • File Path — Exact file and line number
  • Scanner — Which tool detected it (Semgrep, Trivy, Gitleaks, etc.)
  • CWE ID — Common Weakness Enumeration reference
  • Remediation — How to fix it, with code examples when available

AI-Powered Remediation (Deep Scan)

For Deep Scans, each finding includes AI-generated remediation advice:

  • Explanation of why the code is vulnerable
  • Fix suggestion with before/after code examples
  • Confidence level of the recommendation
  • References to relevant security standards

Vulnerability Correlation

Deep Scans include automatic vulnerability correlation:

Deduplication

When multiple scanners detect the same issue (e.g., Semgrep and Bandit both flag a SQL injection), CodeStax merges them into a single finding instead of showing duplicates.

Attack Chain Detection

CodeStax identifies related vulnerabilities that could be chained together for greater impact. For example:

  • An XSS vulnerability + a CSRF bypass = potential account takeover
  • An open redirect + a session fixation = authentication bypass
  • An SQL injection + missing encryption = data breach risk

Attack chains are highlighted with a risk multiplier that increases the severity of the combined findings.

Dashboard Overview

The main dashboard shows:

WidgetDescription
Total ScansCount and completion status
Security Score0-100 compliance score
Issues FoundTotal across all scans
Active ScansCurrently running/queued
Recent ScansLast 6 scans with quick status
System StatusScanner availability

PDF Reports

Generate a downloadable PDF security report for any scan:

  • Executive Summary — High-level overview for management
  • Compliance Matrix — SOC 2 and ISO 27001 status mapping
  • Detailed Findings — Every issue with severity, file location, and remediation
  • Severity color-coding — Critical (red), High (orange), Medium (yellow) in the PDF