Advanced Mode
Full control over scanning behavior, engine selection, and output formats. For power users who need fine-grained configuration.
Overview
Advanced mode gives you complete control over Bloodhound's scanning pipeline. Select specific engines, customize rules, tune performance, and choose output formats for your exact use case.
Engine Selection
Choose which analysis engines to run based on your needs. More engines means deeper analysis but longer scan times.
| Engine | Description | Default |
|---|---|---|
| pattern | Regex-based pattern matching (2,400+ patterns) | ✓ On |
| sast | Static Application Security Testing with AST analysis | ✓ On |
| dependencies | Dependency vulnerability scanning (CVE databases) | ✓ On |
| taint | Taint analysis for data flow tracking | ✓ On |
| symbolic | Symbolic execution for deep analysis | Off |
| graph | Code graph analysis for complex patterns | Off |
| ai | AI-powered verification and false positive reduction | ✓ On |
Custom Rules
Define custom detection rules to match your organization's specific security requirements and coding standards.
Rule Testing
bloodhound test-rule ./rule.yaml --sample ./test-file.tsPerformance Tuning
Optimize scan performance for your infrastructure and codebase size.
Performance Recommendations
--parallel 8 and consider --incremental for CI.--incremental, file filtering, and consider distributed scanning.Output Formats
Choose the output format that fits your workflow and tooling.
Machine-readable JSON for CI/CD pipelines
SARIF 2.1.0 for GitHub/GitLab integration
Interactive HTML report with charts
Markdown for pull request comments
CSV for spreadsheet analysis
JUnit XML for test frameworks
SonarQube generic issue format
Debugging
Debug tools for troubleshooting scan issues and understanding analysis behavior.
Debug Output Size
--debug-fileto limit debugging to specific files when investigating issues.