SAST Analyzers (CORE)

SAST relies on underlying third party tools that are wrapped into what we call "Analyzers". An analyzer is a dedicated project that wraps a particular tool to:

  • Expose its detection logic.
  • Handle its execution.
  • Convert its output to the common format.

This is achieved by implementing the common API.

SAST supports the following official analyzers:

The analyzers are published as Docker images that SAST uses to launch dedicated containers for each analysis.

SAST is pre-configured with a set of default images that are maintained by GitLab, but users can also integrate their own custom images.

Official default analyzers

Any custom change to the official analyzers can be achieved by using an environment variable in your .gitlab-ci.yml.

Using a custom Docker mirror

You can switch to a custom Docker registry that provides the official analyzer images under a different prefix. For instance, the following instructs SAST to pull my-docker-registry/gl-images/bandit instead of In .gitlab-ci.yml define:

  - template: Security/SAST.gitlab-ci.yml

  SECURE_ANALYZERS_PREFIX: my-docker-registry/gl-images

This configuration requires that your custom registry provides images for all the official analyzers.

Selecting specific analyzers

WARNING: SAST_DEFAULT_ANALYZERS is deprecated in GitLab 13.8, and is scheduled for removal in GitLab 14.0.

You can select the official analyzers you want to run. Here's how to enable bandit and flawfinder while disabling all the other default ones. In .gitlab-ci.yml define:

  - template: Security/SAST.gitlab-ci.yml

  SAST_DEFAULT_ANALYZERS: "bandit,flawfinder"

bandit runs first. When merging the reports, SAST removes the duplicates and keeps the bandit entries.

Disabling all default analyzers

Setting SAST_DISABLED to true disables all the official default analyzers. In .gitlab-ci.yml define:

  - template: Security/SAST.gitlab-ci.yml


That's needed when one totally relies on custom analyzers.

Disabling specific default analyzers

Set SAST_EXCLUDED_ANALYZERS to a comma-delimited string that includes the official default analyzers that you want to avoid running. In .gitlab-ci.yml define the following to prevent the eslint analyzer from running:

  - template: Security/SAST.gitlab-ci.yml


Custom Analyzers

You can provide your own analyzers by defining CI jobs in your CI configuration. For consistency, you should suffix your custom SAST jobs with -sast. Here's how to add a scanning job that's based on the Docker image my-docker-registry/analyzers/csharp and generates a SAST report gl-sast-report.json when /analyzer run is executed. Define the following in .gitlab-ci.yml:

    name: "my-docker-registry/analyzers/csharp"
    - /analyzer run
      sast: gl-sast-report.json

The Security Scanner Integration documentation explains how to integrate custom security scanners into GitLab.

Analyzers Data

Property / Tool Apex Bandit Brakeman ESLint security SpotBugs Flawfinder Gosec Kubesec Scanner MobSF NodeJsScan PHP CS Security Audit Security code Scan (.NET) Sobelow
Severity 𐄂 𐄂 𐄂
Description 𐄂 𐄂 𐄂 𐄂 𐄂 𐄂
Start line 𐄂
End line 𐄂 𐄂 𐄂 𐄂 𐄂 𐄂 𐄂 𐄂 𐄂
Start column 𐄂 𐄂 𐄂 𐄂 𐄂 𐄂
End column 𐄂 𐄂 𐄂 𐄂 𐄂 𐄂 𐄂 𐄂 𐄂 𐄂
External ID (for example, CVE) 𐄂 𐄂 𐄂 𐄂 𐄂 𐄂 𐄂 𐄂 𐄂 𐄂
URLs 𐄂 𐄂 𐄂 𐄂 𐄂 𐄂 𐄂 𐄂 𐄂
Internal doc/explanation 𐄂 𐄂 𐄂 𐄂 𐄂 𐄂 𐄂 𐄂
Solution 𐄂 𐄂 𐄂 𐄂 𐄂 𐄂 𐄂 𐄂 𐄂 𐄂
Affected item (for example, class or package) 𐄂 𐄂 𐄂 𐄂 𐄂 𐄂 𐄂 𐄂
Confidence 𐄂 𐄂 x 𐄂 𐄂 𐄂 𐄂
Source code extract 𐄂 𐄂 𐄂 𐄂 𐄂 𐄂 𐄂 𐄂
Internal ID 𐄂 𐄂 𐄂
  • ✓ => we have that data
  • => we have that data but it's partially reliable, or we need to extract it from unstructured content
  • 𐄂 => we don't have that data or it would need to develop specific or inefficient/unreliable logic to obtain it.

The values provided by these tools are heterogeneous so they are sometimes normalized into common values (for example, severity, confidence, and so on).