Analyze Your Results
Viewing Vulnerabilities
The JFrog extension features a file tree displaying all vulnerabilities detected within the project. Each affected file appears as a tree node.
- Descriptor files (e.g.,
pom.xmlin Maven,go.modin Go) outline available direct dependencies. If a direct dependency contains vulnerable child dependencies, the tree will display those, denoted with an '(indirect)' postfix. - Additional vulnerability nodes, such as Contextual Analysis Vulnerabilities (when applicable), hard-coded secrets, and SAST, may appear in other source files.
Each file node is interactive—click to expand and navigate to the corresponding file in the IDE. The extension highlights vulnerable lines for better visibility.
- Locations with vulnerabilities are marked in the editor.
- Click the light bulb icon next to a vulnerable line to jump to its entry in the tree view.
- Clicking on a CVE entry will open the issue’s location in the editor along with a vulnerability details view that includes impacted components, fixed versions, and impact paths.
CVE Research and Enrichment
For selected security issues, the JFrog Security Research team provides enriched CVE data to help prioritize fixes:
- JFrog Severity: JFrog Security’s assessment of the CVE’s likelihood of exploitation.
- Research Summary: Detailed conditions explaining CVE applicability.
- Remediation Steps: Fix and mitigation options.
Vulnerability Contextual Analysis
- Requires Xray v3.66.5+ and Enterprise X/Enterprise+ subscription with Advanced DevSecOps.
Xray automatically analyzes high-impact vulnerabilities to determine their real-world applicability. This includes:
- Contextual Analysis Status: Indicates if a CVE is applicable to your application.
- Breakdown: Explanation of why a CVE is relevant or not.
- Remediation Guidance: Contextual mitigation steps for fixing vulnerabilities.
Static Application Security Testing (SAST)
- Requires Xray v3.66.5+ and Enterprise X/Enterprise+ subscription with Advanced DevSecOps.
JFrog SAST scans detect vulnerabilities such as:
- Injection Attacks (SQL, Command, Code, SSRF)
- Unsafe API Usage (encryption, cryptographic signing, file operations)
SAST findings help developers track vulnerabilities efficiently:
- Data Flow Analysis: Maps the vulnerability’s lifecycle from entry to execution.
- Fix Steps: Provides recommended fixes and mitigation strategies.
- Risk Assessment: Severity classification to prioritize fixes effectively.
Secrets Detection
- Requires Xray v3.66.5+ and Enterprise X/Enterprise+ subscription with Advanced DevSecOps.
Detect exposed secrets (e.g., API tokens, credentials) within code to prevent accidental leaks.
- To ignore a detected secret, add a comment with
jfrog-ignoreabove the affected line.
Infrastructure as Code (IaC) Scan
- Requires Xray v3.66.5+ and Enterprise X/Enterprise+ subscription with Advanced DevSecOps.
Scan Infrastructure as Code (Terraform) files for early detection of cloud and infrastructure misconfigurations.
Resolve Issues
CVE Quick Fix
Update a vulnerable direct dependency to a fixed version directly from the vulnerable location in the editor using the quick fix feature.
Ask Copilot to Fix
Info
Available with the Unified Security Bundle or the Ultimate Security Bundle
Info
The information and documents generated by your AI system may contain errors, omissions, or inaccuracies and should not be relied upon without independent review and verification. Users are responsible for reviewing all AI-generated actions and results for accuracy, completeness, and suitability for their specific needs before making any decisions or taking any actions based on such output.
Info
You can resolve CVEs, SAST findings, exposed secrets, and IaC misconfigurations
Sends the issue context and JFrog’s remediation suggestion (upgrade or code patch) to Copilot for an IDE-native fix.
When you select Ask Copilot to Fix, the assistant sends the issue context and JFrog’s remediation suggestion to Copilot. Remediations can be either:
- Upgrade dependency (bump a package version), or
- Patch the code (apply a code change to remove the vulnerable pattern).
If the remediation is upgrade dependency and a JFrog remote MCP server is available, Copilot is instructed to ensure the proposed upgrade meets your Curation policy before applying it. Enable the JFrog Remote MCP server
Before You Begin
Ensure you have:
- GitHub Copilot installed
- (Optional) Enabled the JFrog remote MCP to have dependency upgrades checked against your Curation policy
Procedure
- In the JFrog extension pane, right-click a listed vulnerability under a specific file (SAST, Secrets, IaC, and CVEs) and select Ask Copilot to Fix.
A Copilot chat pre-filled with issue context opens and prompts Copilot to suggest a fix.
If Copilot proposes a dependency upgrade and remote MCP is enabled, it will only choose a version allowed by your Curation policy.
Ignore Findings
If Xray watches are used, a closed eye icon will appear next to a vulnerability line. Clicking on it allows you to create an Ignore Rule in Xray.