For every relevant violation detected, Clayton, maps the identified problems with the related software security weakness definition specified by the CWE community (

The CWE official resources and IDs are accessible directly in-app with every code review and present in all the reports. You can read more here.

Did this answer your question?