You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
I'm curious if the standard would consider supporting a metadata field that could link a user to resources to learn about how to remediate the vulnerability. For example if a SAST tool identifies a certain CWE error like SQL injection and then links the user to a resource like this: https://free.codebashing.com/courses/java/lessons/sql_injection.
The text was updated successfully, but these errors were encountered:
curious if the standard would consider supporting a metadata field that could link a user to resources to learn about how to remediate the vulnerability
or SARIF tooling could auto-remediation findings directly through metadata
Companies like Checkmarx offer tools like https://free.codebashing.com/ and other companies like https://securecodewarrior.com/ also work in this space.
I'm curious if the standard would consider supporting a metadata field that could link a user to resources to learn about how to remediate the vulnerability. For example if a SAST tool identifies a certain CWE error like SQL injection and then links the user to a resource like this: https://free.codebashing.com/courses/java/lessons/sql_injection.
The text was updated successfully, but these errors were encountered: