For every relevant violation detected, Clayton, maps the identified problems with the related software security weakness definition specified by the CWE community (https://cwe.mitre.org/index.html).
โ
The CWE official resources and IDs are accessible directly in-app with every code review and present in all the reports. You can read more here.