- 필수 기능
- 시작하기
- Glossary
- 표준 속성
- Guides
- Agent
- 통합
- 개방형텔레메트리
- 개발자
- Administrator's Guide
- API
- Datadog Mobile App
- CoScreen
- Cloudcraft
- 앱 내
- 서비스 관리
- 인프라스트럭처
- 애플리케이션 성능
- APM
- Continuous Profiler
- 스팬 시각화
- 데이터 스트림 모니터링
- 데이터 작업 모니터링
- 디지털 경험
- 소프트웨어 제공
- 보안
- AI Observability
- 로그 관리
- 관리
Static Code Analysis is Datadog’s Static Application Security Testing (SAST) capability. SAST is a clear-box software testing technique that analyzes a program’s pre-production code without the need to execute the program, meaning that the program is static because it isn’t running.
Static Code Analysis helps you identify security vulnerabilities and maintainability issues early in the software development life cycle (SDLC) to ensure only the highest quality, most secure code makes it to production.
Using Static Code Analysis provides organizations with the following benefits:
Static Code Analysis supports scanning for security vulnerabilities and poor coding practices in the following languages and technologies:
To get started, you can set up Static Code Analysis on the Code Security page or see the Setup documentation.
You can run Static Analysis on any CI platform provider of your choice. See provider-specific documentation to set up Static Code Analysis in your CI pipelines:
During code reviews on GitHub, Datadog can automatically flag Static Analysis violations in pull requests by adding inline review comments on the relevant line(s) of code. When applicable, Datadog also provides suggested fixes that can be applied directly in the pull request. You can also open a pull request directly from Datadog to fix a vulnerability or quality issue.
You can identify code vulnerabilities in real time as you edit a file in your Integrated Development Environment (IDE). See integration-specific documentation for more information:
After you configure your CI pipelines to run the Datadog static analyzer, violations are summarized per repository on the Code Security Repositories page. Click on a repository to analyze Code Vulnerabilities and Code Quality results from Static Code Analysis.
To filter your results, use the facets to the left of the list, or search. Results can be filtered by service or team facets. For more information about how results are linked to Datadog services and teams, see Getting Started with Code Security.
Every row represents a violation. Each violation is associated with the specific commit and branch that is selected in the filters at the top of the page (by default, results are shown for the latest commit on the default branch of the repository you are viewing).
Click on a violation to open a side panel that contains information about the scope of the violation and where it originated.
The content of the violation is shown in tabs:
In Datadog Static Analysis, there are two types of suggested fixes:
The two types of fixes are distinguished visually in the UI with different labels.
You can push a code change to fix an issue found by Static Code Analysis directly from a result in Datadog in two ways.
If your GitHub app’s Pull Requests permission is set to Read & Write, one-click remediation is enabled for all Static Code Analysis findings with an available suggested fix. For more information about setting up the GitHub integration, see GitHub Pull Requests.
Follow these steps to fix a vulnerability and open a pull request:
You can also fix a vulnerability by committing directly to the branch the result was found on.
To commit a suggested fix:
To customize which Static Analysis rules are configured in your repositories, see the Setup documentation.
If you believe a specific violation is a false positive, you can flag it as a false positive with a reason for flagging, which sends a report to Datadog. Submissions are reviewed on a regular basis to improve ruleset quality over time.