View your first Snyk Projects
Introduction: see what Snyk scanned
We can now see your scan results.
View imports
In the Snyk Web UI, navigate to your Projects page, and see your imported repositories (or targets if importing non-code information). For example:

For each entry, the left icon shows the number of Snyk Projects in each entry, plus the Git-based repository the projects are imported from. For example .
Private / public repositories: the lock symbol
When setting up your GitHub integration, you can choose whether Snyk can access public and private repositories, or public repositories only:

When you then import a Project, private repositories are identified with a “lock” symbol () in the imported scan details:

For customers on free plans, private repository scans count towards your test count limit.
View lists of Projects
When you open an entry, you see the different Snyk Projects scanned in that entry.
For example:

Understand Project information
Why are there several items here? What do they mean? Which should I use?
When we import Snyk Projects for the first time, there’s a lot of information - don’t worry!
When you write your application, you may write your own code, import Open Source libraries with dependencies, and build all of that all into a container for deployment.
Snyk scans different parts of this lifecycle, with different icons and entries showing the results for each of these parts of your work, including:
Your own code analysis results, scanned by Snyk Code.
Your open source libraries, scanned by Snyk Open Source, displaying each detected manifest, such as pom.xml, package.json, and other manifests for these libraries.
Container results, scanned by Snyk Container, for items built into a container, such as a Docker file.
Kubernetes deployment files, terraform and other IaC files, scanned by Snyk Infrastructure as Code (IaC).
Viewing Project settings
Snyk treats each item in this list as a separate Project.
This allows you to control settings for that Project, by clicking on the cog icon () to define how that Project is scanned:

For example, you can change scan frequency, setting how often scans are run by default. See View Project Settings for more information.
Scan results
Let’s go back to the results for your scan:

The scan shows you all vulnerabilities in all aspects of an application. Of course, it's unlikely that you are responsible for every entry in this list, but it's important to be aware of the full picture.
So if your Snyk Open Source scan shows no vulnerabilities in your open source libraries - great 🎉! But there may still be a lot of issues identified by other scans, such your container. And even if the developers in your team did not create or manage these issues, you should still know about them.
More information
Refer to the Snyk Training course, Introduction to the Snyk UI, to learn more about reviewing results from open source, code, container, and infrastructure file scans.
What's next?
Now you understand what results you're seeing, you need to understand the vulnerabilities themselves.
Last updated
Was this helpful?