SAST Analysis Engine
Deep static analysis using Abstract Syntax Trees, control flow graphs, and semantic modeling. Understands your code like a compiler does.
Overview
The SAST (Static Application Security Testing) Engine performs deep semantic analysis of your source code without executing it. Unlike pattern matching, SAST understands the structure and meaning of your code, enabling detection of complex vulnerabilities that span multiple files and functions.
Parsing
Source code is parsed into language-specific ASTs using tree-sitter grammars
Type Resolution
Types are inferred and resolved across module boundaries
Flow Analysis
Control and data flow graphs are constructed for each function
Vulnerability Mapping
Security rules are applied against the semantic model
AST Analysis
The engine parses source code into Abstract Syntax Trees using language-specific grammars. This preserves the full semantic structure while normalizing syntax variations.
Control Flow Analysis
The engine builds control flow graphs (CFGs) to understand all possible execution paths through your code. This enables detection of vulnerabilities that only occur under specific conditions.
What Control Flow Analysis Detects
Semantic Analysis
Beyond syntax, the engine performs semantic analysis to understand types, scopes, and the meaning of operations.
Vulnerability Detection
| Vulnerability | Severity | CWE |
|---|---|---|
| Null Pointer Dereference | high | CWE-476 |
| Resource Leak | medium | CWE-772 |
| Unvalidated Redirect | medium | CWE-601 |
| Insecure Randomness | high | CWE-330 |
| Path Traversal | high | CWE-22 |
| Race Condition | medium | CWE-362 |