Documentation Index
Fetch the complete documentation index at: https://docs.corgea.app/llms.txt
Use this file to discover all available pages before exploring further.
Overview
AI-native SAST is Corgea’s next-generation code scanning solution, designed to detect and fix security vulnerabilities in application code, with a particular emphasis on business logic, authentication and code flaws. Unlike traditional Static Application Security Testing (SAST) tools, AI-native SAST uses advanced AI-driven techniques to enhance detection accuracy, reduce false positives, and provide actionable insights for developers and security teams. By leveraging the power of Large Language Models (LLMs) combined with static analysis, AI-native SAST delivers a deeper contextual understanding of code, allowing it to detect vulnerabilities that standard SAST tools might miss. This document provides a technical overview of how AI-native SAST works, what it can detect, and how it integrates into development workflows.Key Features
AI-Enhanced Detection
AI-Enhanced Detection
- Combines the reasoning capabilities of LLMs with static code analysis
- Accurately detects vulnerabilities with contextual understanding
- Identifies both business logic and traditional SAST vulnerabilities
Developer Experience
Developer Experience
- Low false positive rate reduces noise in scanning results
- Actionable insights with clear explanations
- Seamless integration with CI/CD pipelines and pull requests
Security Coverage
Security Coverage
- Business logic vulnerability detection
- Authentication and authorization flaws
- Comprehensive vulnerability detection across multiple categories
Vulnerability Classes Detected
AI-native SAST excels at detecting business logic vulnerabilities, which are often missed by traditional SAST tools. Below are some of the specific vulnerabilities detected by AI-native SAST:Access Control
Access Control
- Broken Access Control (CWE-639): Missing authorization checks allowing unauthorized access
- Insecure Direct Object References (CWE-639): Direct access to objects without proper authorization
- Path Traversal (CWE-22): Directory traversal attacks accessing unauthorized files
- Insecure Authorization (CWE-285): Weak access controls
- Privilege Escalation (CWE-269): Improper privilege management
- Missing Function Level Access Control (CWE-285): Unprotected administrative functions
Injection Vulnerabilities
Injection Vulnerabilities
- SQL Injection (CWE-89): Unsanitized SQL queries allowing database manipulation
- Command Injection (CWE-78): OS command injection vulnerabilities
- Cross-Site Scripting (XSS) (CWE-79): Injection of malicious scripts into web pages
- LDAP Injection (CWE-90): LDAP query manipulation
- XML Injection (CWE-91): XML content manipulation
- Code Injection (CWE-94): Dynamic code execution vulnerabilities
- Expression Language Injection (CWE-917): Injection in expression languages
- Template Injection (CWE-1336): Server-side template injection
Authentication and Authorization
Authentication and Authorization
Cryptographic Failures
Cryptographic Failures
- Insecure Data Storage (CWE-311): Weak encryption or plaintext storage
- Weak Cryptography (CWE-327): Use of broken or risky cryptographic algorithms
- Insufficient Entropy (CWE-330): Predictable random number generation
- Hardcoded Secrets (CWE-798): Embedded credentials
- Sensitive Data Exposure (CWE-200): Information leaks
- Improper Certificate Validation (CWE-295): SSL/TLS validation failures
Data Handling and Validation
Data Handling and Validation
- Unhygienic Data Handling (CWE-20): Poor input validation
- Improper Output Encoding (CWE-116): Inadequate output sanitization
- Mass Assignment (CWE-915): Binding of request parameters to internal objects
- XML External Entity (XXE) (CWE-611): XML parser vulnerabilities
- Deserialization of Untrusted Data (CWE-502): Insecure object deserialization
Security Misconfiguration
Security Misconfiguration
- Security Misconfiguration (CWE-16): Improper security settings
- Default Configurations (CWE-1188): Use of insecure default settings
- Missing Security Headers (CWE-693): Absence of protective HTTP headers
- Verbose Error Messages (CWE-209): Information disclosure through errors
- Directory Listing (CWE-548): Exposed directory contents
Business Logic and Code Flow
Business Logic and Code Flow
- Business Logic Vulnerabilities (CWE-840): Flaws that allow users to manipulate or bypass critical processes
- Code Logic Vulnerabilities (CWE-633): Errors in conditions or loops leading to unexpected behavior
- Context Dependent Vulnerabilities (CWE-696): Time-based or state-dependent errors
- Race Conditions (CWE-362): Uncontrolled timing/ordering of operations
- Timing Attacks (CWE-208): Time-based information leaks
Server-Side Request Forgery
Server-Side Request Forgery
- SSRF (CWE-918): Server-side request forgery allowing unauthorized internal requests
- URL Redirection (CWE-601): Unvalidated redirects and forwards
- DNS Rebinding (CWE-350): DNS-based SSRF attacks
Logging and Monitoring Failures
Logging and Monitoring Failures
- Improper Logging (CWE-532): Sensitive data in logs
- Insufficient Logging (CWE-778): Missing security event logging
- Improper Error Handling (CWE-209): Information leaks in error messages
- Improper Exception Handling (CWE-248): Security risks from poor exception management
- Missing Audit Trail (CWE-778): Inadequate activity tracking
Malicious Code Detection
Malicious Code Detection
- Malicious Code (CWE-506): Unauthorized harmful actions
- Backdoors (CWE-288): Hidden access mechanisms
- Time Bombs (CWE-511): Triggered malicious actions
- Supply Chain Attacks (CWE-1357): Compromised dependencies or updates
Privacy & Resources
Privacy & Resources
- Data Exfiltration (CWE-319): Unauthorized data transmission
- Unethical Data Collection (CWE-359): Improper data gathering
- Malicious Network Activity (CWE-293): Suspicious connections
- Crypto Mining (CWE-400): Unauthorized resource usage
- Resource Exhaustion (CWE-400): Denial of service through resource consumption
Secret Scanning
Comprehensive Vulnerability Coverage
Corgea’s AI-native SAST provides extensive vulnerability coverage that goes beyond industry standards like the OWASP Top 10 and the Top 25 CWEs. Our platform continuously expands its vulnerability database to stay ahead of emerging threats and address a wide range of security issues across different programming languages and frameworks.Depth and Breadth of Coverage
Our vulnerability coverage spans multiple dimensions to ensure thorough analysis of your codebase:Language-Specific Vulnerabilities
Language-Specific Vulnerabilities
Framework-Specific Vulnerabilities
Framework-Specific Vulnerabilities
Cross-Language Vulnerabilities
Cross-Language Vulnerabilities
- Insecure cryptographic practices
- Improper input validation
- Race conditions
- Authentication and authorization flaws
Emerging Threats
Emerging Threats
Why Comprehensive Coverage Matters
Reduced Risk
Compliance
Efficiency
Continuous Improvement
Technology Behind AI-native SAST
AI-native SAST is powered by Corgea’s proprietary CodeIQ technology, combining AI with Abstract Syntax Trees (ASTs) for comprehensive analysis:Project-Level Analysis
Contextual Intelligence
Comparison to Traditional Methods
Integration and Workflow
Integration Points
- CI/CD Pipelines: Automatic scanning at commits/PRs
- Pull Request Reviews: Pre-merge vulnerability analysis
- IDE Integration: Real-time feedback during development
Supported Languages and Frameworks
Corgea provides comprehensive support for scanning, false positive detection, and auto-fixing across multiple programming languages and their popular frameworks, covering approximately 900 Common Weakness Enumerations (CWEs).Language Support
C#
C#
Python
Python
Ruby
Ruby
Go
Go
JavaScript & TypeScript
JavaScript & TypeScript
Java
Java
PHP
PHP
Kotlin
Kotlin
Swift
Swift
C & C++
C & C++
Key Capabilities
Comprehensive Scanning
False Positive Detection
Automated Fixing
Framework-Specific Analysis
Intelligent File Filtering
To optimize scan performance and accuracy, Corgea automatically excludes files that are not relevant to security analysis:Files We Skip
Non-Source Files
Non-Source Files
- Media files (images, videos, fonts)
- Style files (CSS, SCSS, LESS)
- Documentation and markdown files
- Configuration archives and compressed files
Development and Testing
Development and Testing
- Test files and test directories
- Mock and fixture data
- Code coverage reports
Generated and Processed Code
Generated and Processed Code
- Auto-generated code files
- Minified or bundled code
- Database migration files
- Type definition files
Build Artifacts
Build Artifacts
- Compiled binaries and build outputs
Files Used for Context
While not directly scanned for vulnerabilities, Corgea may reference certain files to provide better analysis context, including README files, configuration examples, and application settings files.Custom Configuration
You can further customize scanning behavior using acorgea.yaml configuration file in your repository root:
Why We Filter
Our intelligent filtering approach:- Improves accuracy by focusing on actual application code
- Reduces noise from test files and third-party code
- Optimizes performance for faster scan results
- Prioritizes findings in code you maintain
