All Collections
Rule documentation
Common Weakness Enumeration mapping
Common Weakness Enumeration mapping
Gabriele Gallo Stampino avatar
Written by Gabriele Gallo Stampino
Updated over a week ago

For every relevant violation detected, Clayton, maps the identified problems with the related software security weakness definition specified by the CWE community (

The CWE official resources and IDs are accessible directly in-app with every code review and present in all the reports. You can read more here.

Did this answer your question?