Skip to main content

Understanding Eclipse Scan Results

When you view scan results in Eclipse, CxSAST provides an interactive interface for navigating the results:

6345589011.jpg

In addition to the regular Eclipse code pane (default position: upper-left), the CxViewer interface includes four panes with different levels of information:

  • CxViewer Tree (default position: lower-right): Lists all vulnerability types in a navigation tree according to Severity (High / Medium / Low / Information).

  • CxViewer Results : Tabular list of found instances' details . Select an instance to emphasize it in the graphs (Full Graph and Graph Navigation; see below) and to display it in the CxViewer Path (see below).

  • CxViewer Description: Displays comprehensive information about this vulnerability type, including risk details, a description of the cause and mechanism, recommendations for avoiding the vulnerability and source code examples.

    Clicking ( 6345589008.jpg ) takes you to Codebashing, our interactive learning platform, where you can learn about code vulnerabilities, why they happen, and how to eliminate them. Once there, select a tutorial and start sharpening your skills.

    Notice

    Codebashing™

    CxSAST users can have free access to a limited set of Codebashing lessons.

    Available free lessons are: SQL Injection (SQLi), Cross-site scripting (XSS), XML Injection (XXE). The free lessons are available for the following programming languages: Java, .Net, PHP, Node.JS, Ruby, Python

    The full (paid) version will include over 150+ individual lessons across many common web, mobile and embedded programming languages. Please refer to Codebashing for a full list of supported programming languages and lessons.

  • Full Graph (default position: lower-left): Graphical display of full paths of all found instances of the vulnerability type that is selected in the CxViewer Tree. Graphical intersections represent the relationships between the instances. The instance that is selected in the CxViewer Results is emphasized in the Graph (bold arrows), and one of its elements is highlighted (bold border, green fill).

    The red-bordered element represents a best-fix location: securing the code at this point will fix multiple instances of the vulnerability.

    If the Graph is large, only part of it may be visible. You can move to other parts with the scroll bar, or by using Graph Navigation (below).

    You can drag elements to re-arrange the graph. Element connections are maintained.

    Select an element in the Full Graph to view and select this code in context in the file's source code above. This also causes the instance in which the element is to be displayed in the Full Path pane.

  • Graph Navigation (default position: tab in lower-right pane): The same content as the Full Graph, zoomed out so that the entire graph is visible. Drag the blue rectangle to set the focus for the Full Graph:

6345589005.jpg
  • Full Path (default position: upper-right): The full path of code elements that constitute the vulnerability instance that is selected in the CxViewer Tree and in the Full Graph. This path represents the full attack vector for the vulnerability instance.

    Select a code element in the Full Path to view and select it in the file's source code.