Snyk Code

Overview

Snyk Code is a security tool that is fast and accurate and produces fewer false positives, making it easier for developers to remediate issues and build secure software.

You can scan your code using the following options:

The following table shows the Snyk Code features, including analysis, managing security issues in your code, and facilitating remediations within your development environment.

FeatureDescription

Issue filtering, sorting, and grouping

To identify the most common problems, you can filter issues based on their severity, programming language, priority score, and other criteria.

Priority Score

Sort by and prioritize the more important issues by incorporating factors such as issue prevalence, ease of fix, and risk factor into a single risk score.

Data flow

Visualize the path of the issue from source to sink with a step-by-step flow.

Vulnerability

Learn more about the vulnerability through curated content that explains how the vulnerability was created, what the risk factors are, and popular mitigation strategies for it.

Fix analysis

Gain insight and context by examining examples with links to actual code that fixes the same issues in similar data flows.

Create Jira issue

Track and export Snyk issues to your Jira project.

Ignore issues

Configure Snyk to ignore suggested fixes for an issue to suppress specific warnings. For example, you may have deliberately used hard-coded passwords to test your routines in test code, or you are aware of an issue but have decided not to fix it.

Exclude files from the import process

Interfile analysis

Deployment

DeploymentDescription

Full SaaS solution

SaaS with a self-hosted Git server (requires Snyk Broker)

Local no-upload implementation (requires Snyk Code Local Engine)

For customers with a stricter upload policy.

AI Engine

Snyk Code is powered by a semantic, AI-based analysis engine and can analyze the following in your code:

  • API usage: Identifies multiple potential issues, including API misuses, null dereferences, and type mismatches, by modeling the use of memory in variables and references. This mechanism can also identify the use of insecure functions.

  • Coding issues: Finds problems such as dead code, branches that are predefined, and branches having the same code on each side.

  • Control flow: Identifies null dereference or race conditions by modeling each possible control flow in the application.

  • Data flow: Follows the flow of data within the application from the source to the sink. Combined with AI-based learning of external insecure data sources, data sinks, and sanitation functions, this enables a strong taint analysis.

  • Hardcoded secrets: Hardcoded secrets detection rules are invoked during SAST scans but do not act as a standalone secrets scanning tool, as this is done through our partnership with third-party tools. See our Snyk Learn lessons on GitGuardian and Nightfall AI.

  • Point-to analysis: Identifies multiple potential issues, including buffer overruns, null dereferences, and type mismatches, by modeling memory use in variables and references.

  • Type inference: Determines the initial type and its changes. This is of special interest for dynamically typed languages.

  • Value ranges: Infers possible values for variables used to call functions to track off-by-one errors in arrays, division-by-zero errors, and null dereferences.

Supported integrations

Snyk Code analysis can be applied to every pull request you create in your Git repository before you merge it into the target branch. See PR Checks.

  • CLI and CI/CD: Using the CLI helps you find and fix security flaws in your code on your local machine or in your CI/CD.

  • APIs and extensibility: Query Code Projects and issues using the Snyk REST API.

  • Notifications: Integrate with Jira to export data to Jira issues.

Supported languages

Snyk Code supports many languages and frameworks.

What's next?

Last updated

More information

Snyk privacy policy

© 2024 Snyk Limited | All product and company names and logos are trademarks of their respective owners.