Skip to content

Findings


The Findings page provides a detailed list of identified vulnerabilities, including their severity levels and affected code components. The findings page also offers the flexibility to tailor your view by applying filters, searching and grouping bulk selection of findings, and more.

Findings page


Key Features


Violations and Findings


The Findings page offers an improved user experience by categorizing "Violations" and "Findings" into distinct tabs.

Violations and Findings


Critical Risk Issues


The Findings page allows you to focus on the most important risks that needs to be addressed immediately. You can view these issues by clicking the Critical Risk Issues tab under Filter By to see these critical risks. For issues to be categorized as critical risk, they must include one of or all the following issues:

  • PII Detection & Missing Branch Protection
  • Privileged Container Running
  • Lack of Code Reviewers, etc.

Critical Risk Issues


Findings Filters


Improve findings management using advanced filters based on Severity, Acknowledgment Status, Manual Tag, etc.

Findings Filters

More Findings Filters


Findings Groupings


The Group Into filter allows you to group violations and findings by Rule ID, Repository, Image, Vulnerability Class, K8s Cluster, or K8s Service.

  • Grouping By Rule ID: This group contains information about Rule IDs, the number of findings, violations, and their severities. Once you expand each result, you can see the Date, Rule Name, Source, Repository, and Scanner.

To get findings groupings by rule id, select Rule ID in the Group Into tab.

Rule ID

  • Grouping By Repository: This group includes the repository, findings, violations, and severities. Once each result is expanded, it displays the date, rule name, repository, source, and scanner.

To get findings groupings by repository, select Repository in the Group Into tab.

Repository Grouping

  • Grouping By Image: Here, not all findings belong to the container type. Therefore, grouping by image is like filtering by container type and grouping by image. This group contains information about the image, such as the number of findings, violations, and severities.

To get findings groupings by image, select Image in the Group Into tab.

Image Grouping

  • Grouping By Vulnerability Class: This group includes the critical risk issues, findings, violations, and severities. Once each result is expanded, it displays the date, rule name, severity, source, repository, and scanner.

To get findings groupings by vulnerability class, select Vulnerability Class in the Group Into tab.

Category Grouping

  • Grouping By K8s Cluster: This group contains violations, critical issues, warning, and minor findings grouped into specific Kubernetes clusters. Once expanded, the date, rule name, source, repository, and scanner are displayed for each Violations and Findings.

To get findings groupings by K8s clusters, select K8s Cluster in the Group Into tab.

K8s Cluster Grouping

  • Grouping By K8s Service: This group contains violations, critical, warning, and minor findings grouped into specific Kubernetes services. Once expanded, the date, rule name, source, repository, and scanner are displayed for each Violations and Findings.

To get findings groupings by K8s services, select K8s Services in the Group Into tab.

K8s Service Grouping


Export Findings


This feature provides a way to export findings data in a .CSV format for further analysis and reporting. You can get a full findings report by clicking the Export Findings button located at the top-right corner of the screen.

Export Findings


Bulk Selection of Findings


Selecting one or more findings enables you to perform triage actions in bulk. These actions help you quickly classify findings, document review decisions, and reduce noise.

The available triage actions include:

  • Override — Manually change the finding’s effective severity or classification to reflect your internal risk decision (for example, when a rule is valid but the risk is lower in your environment).
  • Mark as Verified — Confirm the finding has been reviewed and is considered valid (not a false positive). This is often used to indicate that remediation work should proceed.
  • Suppress as — Hide the finding from active triage views using a suppression reason:

    • False Positive — The finding is not applicable or not actually an issue in your environment.
    • Won’t Fix — The finding is valid, but you are accepting the risk and do not plan to remediate (for example, due to business constraints).
    • Snooze — Temporarily suppress the finding so you can revisit it later (for example, after a release window or dependency upgrade).
  • Remove Suppression — Re-enable a previously suppressed finding.

bulk selection


Findings Metadata


Findings Metadata

Selecting a single finding opens the finding details panel, which provides additional context to help you understand impact, ownership, and remediation options. Metadata can include (depending on the finding type and integration):

  • Security Type Context — The security category associated with the finding (for example, secrets exposure, dependency vulnerability, IaC misconfiguration).
  • Finding Description — A description of what was detected and why it matters.
  • Vulnerability Context — Supporting technical evidence such as affected paths, manifests, images, packages, or configuration details.
  • Package — The impacted library or dependency (for dependency findings), including package name and version.
  • Repository / Asset — The repository, image, or service where the issue was detected.
  • Rule / Detector Details — The rule name/ID that generated the finding and the scanning source that reported it.
  • Triage Status — Whether the finding is open, acknowledged, suppressed, or verified (and any reason provided).

A few key metadata sections are explained below.


Severity Information


Shows the finding’s severity level, as reported by the scanner, and describes the potential impact if the issue is exploited or left unresolved. Severity is typically used to prioritize triage and remediation.


Top Contributors to a Code Repository


This feature highlights the leading contributors to a code repository in a Finding. It is supported for GitHub, ADO, BitBucket, and GitLab repositories.


Transitive Dependencies


Transitive dependencies are indirect dependencies—packages your project depends on through other libraries. A vulnerability may exist in a package you did not install directly, but that still exists in your dependency chain.

Boost Security analyzes dependencies and their associated vulnerabilities comprehensively. It not only identifies issues within the project's direct dependencies but also uncovers vulnerabilities within transitive dependencies. By flagging these transitive dependencies, Boost Security provides an avenue for developers to prioritize and address security issues, thereby ensuring the integrity of applications.

Transitive Dependencies


CVE IDs


The CVE (Common Vulnerabilities and Exposures) identification for findings directly within the Findings View.



Provides links to external advisories and vulnerability references (for example, NVD records, vendor advisories, or package maintainers’ security bulletins) for deeper technical details and remediation guidance.