{"version":1,"pages":[{"id":"1om4rMo1OCYtUtTXxKPe","title":"Whitespots Wiki","pathname":"/","siteSpaceId":"sitesp_INYPE","description":"Welcome to the Whitespots Wiki!"},{"id":"A9XpEk4SZtpzHsZg0M1U","title":"AppSec Portal","pathname":"/appsec-portal","siteSpaceId":"sitesp_INYPE"},{"id":"AcYn5c5xyVZN9iepp9AP","title":"Deployment","pathname":"/appsec-portal/deployment","siteSpaceId":"sitesp_INYPE","emoji":"1f4e5","description":"Welcome to the installation guide for AppSec Portal!","breadcrumbs":[{"label":"AppSec Portal"}]},{"id":"M6smExzK9YjSSbScvwvI","title":"License obtaining","pathname":"/appsec-portal/deployment/license-obtaining","siteSpaceId":"sitesp_INYPE","description":"Before you can use our platform, you'll need to obtain a license","breadcrumbs":[{"label":"AppSec Portal"},{"label":"Deployment","emoji":"1f4e5"}]},{"id":"tyGwAD28SMYG30PpNFZb","title":"Installation","pathname":"/appsec-portal/deployment/installation","siteSpaceId":"sitesp_INYPE","description":"AppSec Portal deployment step-by-step guide","breadcrumbs":[{"label":"AppSec Portal"},{"label":"Deployment","emoji":"1f4e5"}]},{"id":"JoKvXmlXDhTx2zZ5UwTx","title":"Get started with the AppSec Portal","pathname":"/appsec-portal/deployment/get-started-with-the-appsec-portal","siteSpaceId":"sitesp_INYPE","breadcrumbs":[{"label":"AppSec Portal"},{"label":"Deployment","emoji":"1f4e5"}]},{"id":"eEx2Bs72xSD5hBcHCNtU","title":"Configuration options","pathname":"/appsec-portal/deployment/get-started-with-the-appsec-portal/configuration-options","siteSpaceId":"sitesp_INYPE","breadcrumbs":[{"label":"AppSec Portal"},{"label":"Deployment","emoji":"1f4e5"},{"label":"Get started with the AppSec Portal"}]},{"id":"YLI3iFrWa8aeyV1wbBtV","title":"Update","pathname":"/appsec-portal/deployment/update","siteSpaceId":"sitesp_INYPE","description":"How to update AppSec Portal","breadcrumbs":[{"label":"AppSec Portal"},{"label":"Deployment","emoji":"1f4e5"}]},{"id":"UIhwDKgTPXjja5PINJpe","title":"Accessing the AppSec Portal API Endpoints","pathname":"/appsec-portal/deployment/accessing-the-appsec-portal-api-endpoints","siteSpaceId":"sitesp_INYPE","description":"The AppSec Portal provides a comprehensive set of API endpoints that can be used to programmatically interact with the platform.","breadcrumbs":[{"label":"AppSec Portal"},{"label":"Deployment","emoji":"1f4e5"}]},{"id":"MZbkkG794eOOerDdHERt","title":"Database transfer guide","pathname":"/appsec-portal/deployment/database-transfer-guide","siteSpaceId":"sitesp_INYPE","description":"By following the steps outlined in this guide, you can safely and effectively transfer the AppSec Portal's database to a new host","breadcrumbs":[{"label":"AppSec Portal"},{"label":"Deployment","emoji":"1f4e5"}]},{"id":"nTHsr23KRPWSdFFrTnyf","title":"FAQ: typical errors in deployment process","pathname":"/appsec-portal/deployment/faq-typical-errors-in-deployment-process","siteSpaceId":"sitesp_INYPE","description":"","breadcrumbs":[{"label":"AppSec Portal"},{"label":"Deployment","emoji":"1f4e5"}]},{"id":"6yGat5U4tNaft47gvbiR","title":"Post install Configuration","pathname":"/appsec-portal/post-install-configuration","siteSpaceId":"sitesp_INYPE","emoji":"2699","breadcrumbs":[{"label":"AppSec Portal"}]},{"id":"oFV4iDuoKV10tYZJXaTA","title":"Features","pathname":"/appsec-portal/features","siteSpaceId":"sitesp_INYPE","emoji":"1f3af","description":"","breadcrumbs":[{"label":"AppSec Portal"}]},{"id":"OKgbxJmAt8eThwxUwepF","title":"Auto Validator","pathname":"/appsec-portal/features/auto-validator","siteSpaceId":"sitesp_INYPE","emoji":"1f3a3","description":"Triage vulnerabilities faster than ever!","breadcrumbs":[{"label":"AppSec Portal"},{"label":"Features","emoji":"1f3af"}]},{"id":"HplweqtmECBpFIuM2nuR","title":"Rule creation","pathname":"/appsec-portal/features/auto-validator/rule-creation","siteSpaceId":"sitesp_INYPE","description":"","breadcrumbs":[{"label":"AppSec Portal"},{"label":"Features","emoji":"1f3af"},{"label":"Auto Validator","emoji":"1f3a3"}]},{"id":"KhOnCdeSMJXoz9nSb7Zd","title":"Rules view","pathname":"/appsec-portal/features/auto-validator/rules-view","siteSpaceId":"sitesp_INYPE","description":"","breadcrumbs":[{"label":"AppSec Portal"},{"label":"Features","emoji":"1f3af"},{"label":"Auto Validator","emoji":"1f3a3"}]},{"id":"BSBPUNHY3FEnsi220P2M","title":"Deduplicator","pathname":"/appsec-portal/features/deduplicator","siteSpaceId":"sitesp_INYPE","icon":"copy","description":"Deduplicator can help streamline the vulnerability management process and save time by identifying and removing duplicate findings","breadcrumbs":[{"label":"AppSec Portal"},{"label":"Features","emoji":"1f3af"}]},{"id":"T1T7qH14buGl6GFpPhgm","title":"Basic deduplicator rules","pathname":"/appsec-portal/features/deduplicator/basic-deduplicator-rules","siteSpaceId":"sitesp_INYPE","emoji":"2699","description":"","breadcrumbs":[{"label":"AppSec Portal"},{"label":"Features","emoji":"1f3af"},{"label":"Deduplicator","icon":"copy"}]},{"id":"5qBpm67tSHclIq0Gnep0","title":"Advance Deduplicator rules","pathname":"/appsec-portal/features/deduplicator/advance-deduplicator-rules","siteSpaceId":"sitesp_INYPE","emoji":"2699","description":"To set up a rule for Deduplicator, follow the steps below","breadcrumbs":[{"label":"AppSec Portal"},{"label":"Features","emoji":"1f3af"},{"label":"Deduplicator","icon":"copy"}]},{"id":"wyCiWdN0CXPY2l9dFZKl","title":"Vulnerability discovery","pathname":"/appsec-portal/features/vulnerability-discovery","siteSpaceId":"sitesp_INYPE","emoji":"1f526","breadcrumbs":[{"label":"AppSec Portal"},{"label":"Features","emoji":"1f3af"}]},{"id":"j6ODJyTIEIVrZt61TsnW","title":"Audits","pathname":"/appsec-portal/features/vulnerability-discovery/audits","siteSpaceId":"sitesp_INYPE","emoji":"2714","description":"","breadcrumbs":[{"label":"AppSec Portal"},{"label":"Features","emoji":"1f3af"},{"label":"Vulnerability discovery","emoji":"1f526"}]},{"id":"RHdTm5tanUzt1SZBiMjw","title":"Auditor settings","pathname":"/appsec-portal/features/vulnerability-discovery/auditor-settings","siteSpaceId":"sitesp_INYPE","emoji":"2699","breadcrumbs":[{"label":"AppSec Portal"},{"label":"Features","emoji":"1f3af"},{"label":"Vulnerability discovery","emoji":"1f526"}]},{"id":"2Cu9cPrH26nr4Ys6q5Ve","title":"Auditor config","pathname":"/appsec-portal/features/vulnerability-discovery/auditor-settings/auditor-config","siteSpaceId":"sitesp_INYPE","breadcrumbs":[{"label":"AppSec Portal"},{"label":"Features","emoji":"1f3af"},{"label":"Vulnerability discovery","emoji":"1f526"},{"label":"Auditor settings","emoji":"2699"}]},{"id":"s5LepsIQLeO3glIuEQvi","title":"Sequences","pathname":"/appsec-portal/features/vulnerability-discovery/auditor-settings/sequences","siteSpaceId":"sitesp_INYPE","description":"Include the scanners you want in your Pipeline","breadcrumbs":[{"label":"AppSec Portal"},{"label":"Features","emoji":"1f3af"},{"label":"Vulnerability discovery","emoji":"1f526"},{"label":"Auditor settings","emoji":"2699"}]},{"id":"acpvuJpdbhp6L3hwgqVM","title":"Sequences creating","pathname":"/appsec-portal/features/vulnerability-discovery/auditor-settings/sequences/sequences-creating","siteSpaceId":"sitesp_INYPE","description":"","breadcrumbs":[{"label":"AppSec Portal"},{"label":"Features","emoji":"1f3af"},{"label":"Vulnerability discovery","emoji":"1f526"},{"label":"Auditor settings","emoji":"2699"},{"label":"Sequences"}]},{"id":"2d1lpMstWC8BThXRsfUf","title":"Sequences setting","pathname":"/appsec-portal/features/vulnerability-discovery/auditor-settings/sequences/sequences-setting","siteSpaceId":"sitesp_INYPE","breadcrumbs":[{"label":"AppSec Portal"},{"label":"Features","emoji":"1f3af"},{"label":"Vulnerability discovery","emoji":"1f526"},{"label":"Auditor settings","emoji":"2699"},{"label":"Sequences"}]},{"id":"MAmp56P4nXowLd9RVfgu","title":"Run audit","pathname":"/appsec-portal/features/vulnerability-discovery/run-audit","siteSpaceId":"sitesp_INYPE","emoji":"1f50e","breadcrumbs":[{"label":"AppSec Portal"},{"label":"Features","emoji":"1f3af"},{"label":"Vulnerability discovery","emoji":"1f526"}]},{"id":"8miZSpcTNQ1dNqxFrhVQ","title":"Run Audit Manually","pathname":"/appsec-portal/features/vulnerability-discovery/run-audit/run-audit-manually","siteSpaceId":"sitesp_INYPE","breadcrumbs":[{"label":"AppSec Portal"},{"label":"Features","emoji":"1f3af"},{"label":"Vulnerability discovery","emoji":"1f526"},{"label":"Run audit","emoji":"1f50e"}]},{"id":"Uwf0UaFktH4OBxXbJBwY","title":"Scheduled Audit Run","pathname":"/appsec-portal/features/vulnerability-discovery/run-audit/scheduled-audit-run","siteSpaceId":"sitesp_INYPE","description":"Setting up the Auditor's schedule and getting audit results at your desired time","breadcrumbs":[{"label":"AppSec Portal"},{"label":"Features","emoji":"1f3af"},{"label":"Vulnerability discovery","emoji":"1f526"},{"label":"Run audit","emoji":"1f50e"}]},{"id":"VXzyhnNrZw9QRQwHdRU0","title":"Recommendations","pathname":"/appsec-portal/features/recommendations","siteSpaceId":"sitesp_INYPE","emoji":"1f3af","description":"","breadcrumbs":[{"label":"AppSec Portal"},{"label":"Features","emoji":"1f3af"}]},{"id":"J6zeLxHlMbcZFAqVzEFa","title":"Security Metrics","pathname":"/appsec-portal/features/security-metrics","siteSpaceId":"sitesp_INYPE","icon":"gauge-min","description":"By using SLA and WRT, it is possible to achieve faster validation, prioritisation and remediation of vulnerabilities.","breadcrumbs":[{"label":"AppSec Portal"},{"label":"Features","emoji":"1f3af"}]},{"id":"NkEpFGN4iVosH0IEhcSU","title":"Severity Statistics Dashboard","pathname":"/appsec-portal/features/security-metrics/severity-statistics-dashboard","siteSpaceId":"sitesp_INYPE","description":"","breadcrumbs":[{"label":"AppSec Portal"},{"label":"Features","emoji":"1f3af"},{"label":"Security Metrics","icon":"gauge-min"}]},{"id":"ve9afE6zAKdy4DH7nY8j","title":"WRT (Weighted Risk Trend)","pathname":"/appsec-portal/features/security-metrics/wrt-weighted-risk-trend","siteSpaceId":"sitesp_INYPE","description":"","breadcrumbs":[{"label":"AppSec Portal"},{"label":"Features","emoji":"1f3af"},{"label":"Security Metrics","icon":"gauge-min"}]},{"id":"SsXKqeU52W5PwfN8dfhn","title":"How to work with WRT (for team leads)","pathname":"/appsec-portal/features/security-metrics/how-to-work-with-wrt-for-team-leads","siteSpaceId":"sitesp_INYPE","description":"","breadcrumbs":[{"label":"AppSec Portal"},{"label":"Features","emoji":"1f3af"},{"label":"Security Metrics","icon":"gauge-min"}]},{"id":"atRiCqOWV0W7EB0LIq3O","title":"Metrics settings","pathname":"/appsec-portal/features/security-metrics/metrics-settings","siteSpaceId":"sitesp_INYPE","description":"","breadcrumbs":[{"label":"AppSec Portal"},{"label":"Features","emoji":"1f3af"},{"label":"Security Metrics","icon":"gauge-min"}]},{"id":"elmlHlDIMI5MRbflmftM","title":"SLA","pathname":"/appsec-portal/features/security-metrics/metrics-settings/sla","siteSpaceId":"sitesp_INYPE","description":"","breadcrumbs":[{"label":"AppSec Portal"},{"label":"Features","emoji":"1f3af"},{"label":"Security Metrics","icon":"gauge-min"},{"label":"Metrics settings"}]},{"id":"HxfdqiCljZS05WICIflw","title":"CVSS","pathname":"/appsec-portal/features/security-metrics/cvss","siteSpaceId":"sitesp_INYPE","description":"Common Vulnerability Scoring System a standardised method for assessing vulnerabilities in computer systems and networks.","breadcrumbs":[{"label":"AppSec Portal"},{"label":"Features","emoji":"1f3af"},{"label":"Security Metrics","icon":"gauge-min"}]},{"id":"Eizd6Bl2uNnQsgpHuzta","title":"CVSS Rule","pathname":"/appsec-portal/features/security-metrics/cvss/cvss-rule","siteSpaceId":"sitesp_INYPE","breadcrumbs":[{"label":"AppSec Portal"},{"label":"Features","emoji":"1f3af"},{"label":"Security Metrics","icon":"gauge-min"},{"label":"CVSS"}]},{"id":"MdZ0QkCbzOzoO5nBNRSU","title":"Custom Reports","pathname":"/appsec-portal/features/custom-reports","siteSpaceId":"sitesp_INYPE","icon":"file-chart-column","description":"Get an easy-to-use report to analyse and share with others","breadcrumbs":[{"label":"AppSec Portal"},{"label":"Features","emoji":"1f3af"}]},{"id":"5cB35qKWQmABGrsvMYPs","title":"Active tasks","pathname":"/appsec-portal/features/active-tasks","siteSpaceId":"sitesp_INYPE","emoji":"1f4c8","description":"Understand what's going on with Active Tasks tab on the /global-settings/active-tasks page","breadcrumbs":[{"label":"AppSec Portal"},{"label":"Features","emoji":"1f3af"}]},{"id":"H3v33RaOaHiGTcWswymz","title":"Asset management","pathname":"/appsec-portal/features/asset-management","siteSpaceId":"sitesp_INYPE","emoji":"1f9fa","breadcrumbs":[{"label":"AppSec Portal"},{"label":"Features","emoji":"1f3af"}]},{"id":"CrLWaRSLsopKmadF3VfJ","title":"How to import repositories from version control","pathname":"/appsec-portal/features/asset-management/how-to-import-repositories-from-version-control","siteSpaceId":"sitesp_INYPE","breadcrumbs":[{"label":"AppSec Portal"},{"label":"Features","emoji":"1f3af"},{"label":"Asset management","emoji":"1f9fa"}]},{"id":"PLPYXQvJNoZhpHcKam3L","title":"Default product","pathname":"/appsec-portal/features/asset-management/default-product","siteSpaceId":"sitesp_INYPE","breadcrumbs":[{"label":"AppSec Portal"},{"label":"Features","emoji":"1f3af"},{"label":"Asset management","emoji":"1f9fa"}]},{"id":"0hlZM8uEmhggdMhIMS81","title":"Adding a product asset","pathname":"/appsec-portal/features/asset-management/adding-a-product-asset","siteSpaceId":"sitesp_INYPE","description":"","breadcrumbs":[{"label":"AppSec Portal"},{"label":"Features","emoji":"1f3af"},{"label":"Asset management","emoji":"1f9fa"}]},{"id":"CMpGB8Gp0K2mtEEq6ZnX","title":"Asset Transfer Between Products","pathname":"/appsec-portal/features/asset-management/asset-transfer-between-products","siteSpaceId":"sitesp_INYPE","breadcrumbs":[{"label":"AppSec Portal"},{"label":"Features","emoji":"1f3af"},{"label":"Asset management","emoji":"1f9fa"}]},{"id":"p3ZMkMHQtOaUySijNggj","title":"Findings view","pathname":"/appsec-portal/features/findings-view","siteSpaceId":"sitesp_INYPE","emoji":"1f577","description":"","breadcrumbs":[{"label":"AppSec Portal"},{"label":"Features","emoji":"1f3af"}]},{"id":"KgTyjcPGK2sH1bgQnDCe","title":"All findings view","pathname":"/appsec-portal/features/findings-view/all-findings-view","siteSpaceId":"sitesp_INYPE","description":"","breadcrumbs":[{"label":"AppSec Portal"},{"label":"Features","emoji":"1f3af"},{"label":"Findings view","emoji":"1f577"}]},{"id":"q4eCNKmEd9J5meS3rIFA","title":"Grouped findings as a result of","pathname":"/appsec-portal/features/findings-view/grouped-findings-as-a-result-of","siteSpaceId":"sitesp_INYPE","breadcrumbs":[{"label":"AppSec Portal"},{"label":"Features","emoji":"1f3af"},{"label":"Findings view","emoji":"1f577"}]},{"id":"0UcLdjlhrh6MG8YJfJQP","title":"Grouping of findings into groups","pathname":"/appsec-portal/features/findings-view/grouping-of-findings-into-groups","siteSpaceId":"sitesp_INYPE","breadcrumbs":[{"label":"AppSec Portal"},{"label":"Features","emoji":"1f3af"},{"label":"Findings view","emoji":"1f577"}]},{"id":"Q63LcGEbPAXwxvKnhF5O","title":"Available bulk actions","pathname":"/appsec-portal/features/findings-view/available-bulk-actions","siteSpaceId":"sitesp_INYPE","description":"","breadcrumbs":[{"label":"AppSec Portal"},{"label":"Features","emoji":"1f3af"},{"label":"Findings view","emoji":"1f577"}]},{"id":"IdYYmpqGeZLt5c1y2ghX","title":"Viewing specific findings","pathname":"/appsec-portal/features/findings-view/viewing-specific-findings","siteSpaceId":"sitesp_INYPE","description":"","breadcrumbs":[{"label":"AppSec Portal"},{"label":"Features","emoji":"1f3af"},{"label":"Findings view","emoji":"1f577"}]},{"id":"UjhrTBCmkVsByJa7WUjP","title":"Usable filters and easy sorting","pathname":"/appsec-portal/features/findings-view/usable-filters-and-easy-sorting","siteSpaceId":"sitesp_INYPE","description":"","breadcrumbs":[{"label":"AppSec Portal"},{"label":"Features","emoji":"1f3af"},{"label":"Findings view","emoji":"1f577"}]},{"id":"aaORfS5GSp2cmXf2QmLI","title":"Jira","pathname":"/appsec-portal/features/jira","siteSpaceId":"sitesp_INYPE","emoji":"1f4ca","description":"","breadcrumbs":[{"label":"AppSec Portal"},{"label":"Features","emoji":"1f3af"}]},{"id":"hiytKiD2E7itasUdzKDf","title":"Jira integration configuration","pathname":"/appsec-portal/features/jira/jira-integration-configuration","siteSpaceId":"sitesp_INYPE","description":"This guide will walk you through the process of integration configuration","breadcrumbs":[{"label":"AppSec Portal"},{"label":"Features","emoji":"1f3af"},{"label":"Jira","emoji":"1f4ca"}]},{"id":"DMOCOUOYwUNfBSjpQU8d","title":"Setting up Jira webhook","pathname":"/appsec-portal/features/jira/setting-up-jira-webhook","siteSpaceId":"sitesp_INYPE","description":"This guide will walk you through the process of creating a webhook to synchronize Jira spaces with AppSec Portal.","breadcrumbs":[{"label":"AppSec Portal"},{"label":"Features","emoji":"1f3af"},{"label":"Jira","emoji":"1f4ca"}]},{"id":"bNe0pS53Jr3XkkzCvZTM","title":"Move from DefectDojo","pathname":"/appsec-portal/features/move-from-defectdojo","siteSpaceId":"sitesp_INYPE","emoji":"1f47e","description":"","breadcrumbs":[{"label":"AppSec Portal"},{"label":"Features","emoji":"1f3af"}]},{"id":"QgsAfS9PEFCfynCd0lF9","title":"Scanners","pathname":"/appsec-portal/features/scanners","siteSpaceId":"sitesp_INYPE","emoji":"1f52c","description":"The AppSec Portal uses a variety of importers to integrate with popular scanners","breadcrumbs":[{"label":"AppSec Portal"},{"label":"Features","emoji":"1f3af"}]},{"id":"X1Z8yhF5VBsOvkYCHcZT","title":"Importing reports from scanners to AppSec Portal","pathname":"/appsec-portal/features/scanners/importing-reports-from-scanners-to-appsec-portal","siteSpaceId":"sitesp_INYPE","emoji":"1f50c","description":"","breadcrumbs":[{"label":"AppSec Portal"},{"label":"Features","emoji":"1f3af"},{"label":"Scanners","emoji":"1f52c"}]},{"id":"FoIKECaPhMijmswk7dWR","title":"Manual Import using Report File","pathname":"/appsec-portal/features/scanners/importing-reports-from-scanners-to-appsec-portal/manual-import-using-report-file","siteSpaceId":"sitesp_INYPE","emoji":"1f590","breadcrumbs":[{"label":"AppSec Portal"},{"label":"Features","emoji":"1f3af"},{"label":"Scanners","emoji":"1f52c"},{"label":"Importing reports from scanners to AppSec Portal","emoji":"1f50c"}]},{"id":"rohRIHnJZlJhuCBOCVBN","title":"Importing reports via Terminal using a Report File","pathname":"/appsec-portal/features/scanners/importing-reports-from-scanners-to-appsec-portal/importing-reports-via-terminal-using-a-report-file","siteSpaceId":"sitesp_INYPE","icon":"webhook","breadcrumbs":[{"label":"AppSec Portal"},{"label":"Features","emoji":"1f3af"},{"label":"Scanners","emoji":"1f52c"},{"label":"Importing reports from scanners to AppSec Portal","emoji":"1f50c"}]},{"id":"TVAIdHmLsm93M1P91fHS","title":"Importing reports via Lambda Function using a Report File","pathname":"/appsec-portal/features/scanners/importing-reports-from-scanners-to-appsec-portal/importing-reports-via-lambda-function-using-a-report-file","siteSpaceId":"sitesp_INYPE","icon":"webhook","description":"To send scanning data to AppSec Portal","breadcrumbs":[{"label":"AppSec Portal"},{"label":"Features","emoji":"1f3af"},{"label":"Scanners","emoji":"1f52c"},{"label":"Importing reports from scanners to AppSec Portal","emoji":"1f50c"}]},{"id":"CA7yMEbngaXzToYlq8Jm","title":"Scanner description","pathname":"/appsec-portal/features/scanners/scanner-description","siteSpaceId":"sitesp_INYPE","icon":"subtitles","description":"This section describes each scanner used by the AppSec Portal","breadcrumbs":[{"label":"AppSec Portal"},{"label":"Features","emoji":"1f3af"},{"label":"Scanners","emoji":"1f52c"}]},{"id":"W20Kdzc4yBDWkbR8ouEi","title":"Code Scanners","pathname":"/appsec-portal/features/scanners/scanner-description/code-scanners","siteSpaceId":"sitesp_INYPE","icon":"code","breadcrumbs":[{"label":"AppSec Portal"},{"label":"Features","emoji":"1f3af"},{"label":"Scanners","emoji":"1f52c"},{"label":"Scanner description","icon":"subtitles"}]},{"id":"UqUBH7MBpa7VMDVj2KsM","title":"Bandit","pathname":"/appsec-portal/features/scanners/scanner-description/code-scanners/bandit","siteSpaceId":"sitesp_INYPE","description":"Bandit is a popular open-source tool that scans Python code for security vulnerabilities.","breadcrumbs":[{"label":"AppSec Portal"},{"label":"Features","emoji":"1f3af"},{"label":"Scanners","emoji":"1f52c"},{"label":"Scanner description","icon":"subtitles"},{"label":"Code Scanners","icon":"code"}]},{"id":"E2k53CQHBEWgf6fEbBxf","title":"Brakeman","pathname":"/appsec-portal/features/scanners/scanner-description/code-scanners/brakeman","siteSpaceId":"sitesp_INYPE","breadcrumbs":[{"label":"AppSec Portal"},{"label":"Features","emoji":"1f3af"},{"label":"Scanners","emoji":"1f52c"},{"label":"Scanner description","icon":"subtitles"},{"label":"Code Scanners","icon":"code"}]},{"id":"GnAnbVmQoHv8SaKo44KI","title":"Checkov","pathname":"/appsec-portal/features/scanners/scanner-description/code-scanners/checkov","siteSpaceId":"sitesp_INYPE","description":"Checkov Scan is an open-source static analysis tool that scans infrastructure-as-code (IaC) files to identify potential security risks and compliance violations.","breadcrumbs":[{"label":"AppSec Portal"},{"label":"Features","emoji":"1f3af"},{"label":"Scanners","emoji":"1f52c"},{"label":"Scanner description","icon":"subtitles"},{"label":"Code Scanners","icon":"code"}]},{"id":"oDdjYaPDv52CfEdXxQUM","title":"CodeQL","pathname":"/appsec-portal/features/scanners/scanner-description/code-scanners/codeql","siteSpaceId":"sitesp_INYPE","description":"CodeQL is a powerful static analysis tool for analyzing and finding security vulnerabilities in code.","breadcrumbs":[{"label":"AppSec Portal"},{"label":"Features","emoji":"1f3af"},{"label":"Scanners","emoji":"1f52c"},{"label":"Scanner description","icon":"subtitles"},{"label":"Code Scanners","icon":"code"}]},{"id":"KDxEJz7WJSILIqpFuIgb","title":"ESLint","pathname":"/appsec-portal/features/scanners/scanner-description/code-scanners/eslint","siteSpaceId":"sitesp_INYPE","description":"ESLint is a popular open-source static analysis tool that is used to find and fix problems in JavaScript code.","breadcrumbs":[{"label":"AppSec Portal"},{"label":"Features","emoji":"1f3af"},{"label":"Scanners","emoji":"1f52c"},{"label":"Scanner description","icon":"subtitles"},{"label":"Code Scanners","icon":"code"}]},{"id":"NVnQStwQ1hjLZbIH2N84","title":"Gemnasium","pathname":"/appsec-portal/features/scanners/scanner-description/code-scanners/gemnasium","siteSpaceId":"sitesp_INYPE","description":"Dependency Scanning analyzer that uses the GitLab Advisory Database","breadcrumbs":[{"label":"AppSec Portal"},{"label":"Features","emoji":"1f3af"},{"label":"Scanners","emoji":"1f52c"},{"label":"Scanner description","icon":"subtitles"},{"label":"Code Scanners","icon":"code"}]},{"id":"LHL1aLSr0p7HlLzDEj5W","title":"Gosec","pathname":"/appsec-portal/features/scanners/scanner-description/code-scanners/gosec","siteSpaceId":"sitesp_INYPE","description":"Gosec is a security scanner for Go programming language code.","breadcrumbs":[{"label":"AppSec Portal"},{"label":"Features","emoji":"1f3af"},{"label":"Scanners","emoji":"1f52c"},{"label":"Scanner description","icon":"subtitles"},{"label":"Code Scanners","icon":"code"}]},{"id":"R2ZLF91Y717pi5GmSH4m","title":"Hadolint","pathname":"/appsec-portal/features/scanners/scanner-description/code-scanners/hadolint","siteSpaceId":"sitesp_INYPE","description":"Dockerfile linter, validate inline bash, written in Haskell","breadcrumbs":[{"label":"AppSec Portal"},{"label":"Features","emoji":"1f3af"},{"label":"Scanners","emoji":"1f52c"},{"label":"Scanner description","icon":"subtitles"},{"label":"Code Scanners","icon":"code"}]},{"id":"PcVQ1bDxEeX6sh9knv5d","title":"KICS","pathname":"/appsec-portal/features/scanners/scanner-description/code-scanners/kics","siteSpaceId":"sitesp_INYPE","description":"GitLab Analyzer for Infrastructure as Code (IaC) projects","breadcrumbs":[{"label":"AppSec Portal"},{"label":"Features","emoji":"1f3af"},{"label":"Scanners","emoji":"1f52c"},{"label":"Scanner description","icon":"subtitles"},{"label":"Code Scanners","icon":"code"}]},{"id":"pcdFs2Gi04ZSeJbbrgvC","title":"PHPCodeSniffer","pathname":"/appsec-portal/features/scanners/scanner-description/code-scanners/phpcodesniffer","siteSpaceId":"sitesp_INYPE","breadcrumbs":[{"label":"AppSec Portal"},{"label":"Features","emoji":"1f3af"},{"label":"Scanners","emoji":"1f52c"},{"label":"Scanner description","icon":"subtitles"},{"label":"Code Scanners","icon":"code"}]},{"id":"Sfaa107H7EUkGoU1cyPk","title":"Retire.js","pathname":"/appsec-portal/features/scanners/scanner-description/code-scanners/retire.js","siteSpaceId":"sitesp_INYPE","description":"scanner detecting the use of JavaScript libraries with known vulnerabilities","breadcrumbs":[{"label":"AppSec Portal"},{"label":"Features","emoji":"1f3af"},{"label":"Scanners","emoji":"1f52c"},{"label":"Scanner description","icon":"subtitles"},{"label":"Code Scanners","icon":"code"}]},{"id":"WlfC9M5q5gt2BUcXIt0i","title":"Semgrep","pathname":"/appsec-portal/features/scanners/scanner-description/code-scanners/semgrep","siteSpaceId":"sitesp_INYPE","description":"Semgrep is a fast, open-source tool that scans source code to find programming errors, security vulnerabilities, and policy violations.","breadcrumbs":[{"label":"AppSec Portal"},{"label":"Features","emoji":"1f3af"},{"label":"Scanners","emoji":"1f52c"},{"label":"Scanner description","icon":"subtitles"},{"label":"Code Scanners","icon":"code"}]},{"id":"YHgqwSkff77gETKkdNxF","title":"SpotBugs","pathname":"/appsec-portal/features/scanners/scanner-description/code-scanners/spotbugs","siteSpaceId":"sitesp_INYPE","breadcrumbs":[{"label":"AppSec Portal"},{"label":"Features","emoji":"1f3af"},{"label":"Scanners","emoji":"1f52c"},{"label":"Scanner description","icon":"subtitles"},{"label":"Code Scanners","icon":"code"}]},{"id":"0Y3U4eVuDdo4fopwL1w5","title":"Terrascan","pathname":"/appsec-portal/features/scanners/scanner-description/code-scanners/terrascan","siteSpaceId":"sitesp_INYPE","description":"Terrascan is an open-source tool that is used to detect compliance and security violations across Infrastructure as Code (IaC) frameworks.","breadcrumbs":[{"label":"AppSec Portal"},{"label":"Features","emoji":"1f3af"},{"label":"Scanners","emoji":"1f52c"},{"label":"Scanner description","icon":"subtitles"},{"label":"Code Scanners","icon":"code"}]},{"id":"1Hp7cMzylnmJa4j4sMES","title":"Secret Scanners","pathname":"/appsec-portal/features/scanners/scanner-description/secret-scanners","siteSpaceId":"sitesp_INYPE","icon":"code","breadcrumbs":[{"label":"AppSec Portal"},{"label":"Features","emoji":"1f3af"},{"label":"Scanners","emoji":"1f52c"},{"label":"Scanner description","icon":"subtitles"}]},{"id":"2HyK73Oo2GZmnWxPrZD8","title":"Gitleaks","pathname":"/appsec-portal/features/scanners/scanner-description/secret-scanners/gitleaks","siteSpaceId":"sitesp_INYPE","description":"Gitleaks is a powerful open-source tool that helps you find and eliminate sensitive information leaks in your Git repositories.","breadcrumbs":[{"label":"AppSec Portal"},{"label":"Features","emoji":"1f3af"},{"label":"Scanners","emoji":"1f52c"},{"label":"Scanner description","icon":"subtitles"},{"label":"Secret Scanners","icon":"code"}]},{"id":"sQkvH34ZWbEXGJLYmukx","title":"Trufflehog3","pathname":"/appsec-portal/features/scanners/scanner-description/secret-scanners/trufflehog3","siteSpaceId":"sitesp_INYPE","description":"Trufflehog3 is a popular open-source tool for detecting secrets and credentials in source code repositories.","breadcrumbs":[{"label":"AppSec Portal"},{"label":"Features","emoji":"1f3af"},{"label":"Scanners","emoji":"1f52c"},{"label":"Scanner description","icon":"subtitles"},{"label":"Secret Scanners","icon":"code"}]},{"id":"AyG2ISdpEBODcdUkKCCr","title":"Image and code dependency Scanners","pathname":"/appsec-portal/features/scanners/scanner-description/image-and-code-dependency-scanners","siteSpaceId":"sitesp_INYPE","icon":"docker","breadcrumbs":[{"label":"AppSec Portal"},{"label":"Features","emoji":"1f3af"},{"label":"Scanners","emoji":"1f52c"},{"label":"Scanner description","icon":"subtitles"}]},{"id":"7emuqFF6QIZMl9k1bVk6","title":"Trivy","pathname":"/appsec-portal/features/scanners/scanner-description/image-and-code-dependency-scanners/trivy","siteSpaceId":"sitesp_INYPE","description":"Find vulnerabilities, misconfigurations, secrets, SBOM in containers, Kubernetes, code repositories, clouds and more","breadcrumbs":[{"label":"AppSec Portal"},{"label":"Features","emoji":"1f3af"},{"label":"Scanners","emoji":"1f52c"},{"label":"Scanner description","icon":"subtitles"},{"label":"Image and code dependency Scanners","icon":"docker"}]},{"id":"B74y0Pinir0bPA6Mvi1g","title":"Trivy vulners.com plugin","pathname":"/appsec-portal/features/scanners/scanner-description/image-and-code-dependency-scanners/trivy-vulners.com-plugin","siteSpaceId":"sitesp_INYPE","description":"Find vulnerabilities, misconfigurations, secrets, SBOM in containers, Kubernetes, code repositories, clouds and more","breadcrumbs":[{"label":"AppSec Portal"},{"label":"Features","emoji":"1f3af"},{"label":"Scanners","emoji":"1f52c"},{"label":"Scanner description","icon":"subtitles"},{"label":"Image and code dependency Scanners","icon":"docker"}]},{"id":"43XMrDXCIkRpDlXqqelw","title":"Snyk","pathname":"/appsec-portal/features/scanners/scanner-description/image-and-code-dependency-scanners/snyk","siteSpaceId":"sitesp_INYPE","breadcrumbs":[{"label":"AppSec Portal"},{"label":"Features","emoji":"1f3af"},{"label":"Scanners","emoji":"1f52c"},{"label":"Scanner description","icon":"subtitles"},{"label":"Image and code dependency Scanners","icon":"docker"}]},{"id":"c7bfjX1hr5zaab967rvm","title":"Web Scanners","pathname":"/appsec-portal/features/scanners/scanner-description/web-scanners","siteSpaceId":"sitesp_INYPE","icon":"globe-pointer","breadcrumbs":[{"label":"AppSec Portal"},{"label":"Features","emoji":"1f3af"},{"label":"Scanners","emoji":"1f52c"},{"label":"Scanner description","icon":"subtitles"}]},{"id":"jcg5ypjpiPJqOs3yBGt1","title":"Arachni Scan","pathname":"/appsec-portal/features/scanners/scanner-description/web-scanners/arachni-scan","siteSpaceId":"sitesp_INYPE","description":"Arachni Scan is a security scanner designed to identify vulnerabilities and security issues in web applications.","breadcrumbs":[{"label":"AppSec Portal"},{"label":"Features","emoji":"1f3af"},{"label":"Scanners","emoji":"1f52c"},{"label":"Scanner description","icon":"subtitles"},{"label":"Web Scanners","icon":"globe-pointer"}]},{"id":"atFIft88VTL6sEi4UVFX","title":"Acunetix","pathname":"/appsec-portal/features/scanners/scanner-description/web-scanners/acunetix","siteSpaceId":"sitesp_INYPE","description":"Quickly find and fix the vulnerabilities that put your web applications at risk of attack.","breadcrumbs":[{"label":"AppSec Portal"},{"label":"Features","emoji":"1f3af"},{"label":"Scanners","emoji":"1f52c"},{"label":"Scanner description","icon":"subtitles"},{"label":"Web Scanners","icon":"globe-pointer"}]},{"id":"wIBRgcLJuSKvpJ03o28A","title":"Burp Enterprise Scan","pathname":"/appsec-portal/features/scanners/scanner-description/web-scanners/burp-enterprise-scan","siteSpaceId":"sitesp_INYPE","description":"BurpSuite Enterprise is a web vulnerability scanner that is designed for enterprise-level web application security testing.","breadcrumbs":[{"label":"AppSec Portal"},{"label":"Features","emoji":"1f3af"},{"label":"Scanners","emoji":"1f52c"},{"label":"Scanner description","icon":"subtitles"},{"label":"Web Scanners","icon":"globe-pointer"}]},{"id":"dlAxSyr1WoiqOvy9dylK","title":"OWASP Zap","pathname":"/appsec-portal/features/scanners/scanner-description/web-scanners/owasp-zap","siteSpaceId":"sitesp_INYPE","description":"This helps you discover vulnerabilities in web applications","breadcrumbs":[{"label":"AppSec Portal"},{"label":"Features","emoji":"1f3af"},{"label":"Scanners","emoji":"1f52c"},{"label":"Scanner description","icon":"subtitles"},{"label":"Web Scanners","icon":"globe-pointer"}]},{"id":"STSUHEALxRpevbsOHkfD","title":"Infrastructure Scanners","pathname":"/appsec-portal/features/scanners/scanner-description/infrastructure-scanners","siteSpaceId":"sitesp_INYPE","icon":"cloud","breadcrumbs":[{"label":"AppSec Portal"},{"label":"Features","emoji":"1f3af"},{"label":"Scanners","emoji":"1f52c"},{"label":"Scanner description","icon":"subtitles"}]},{"id":"Gnu0GSZdwpIPsPnXDJ87","title":"AWS Security Hub Scan","pathname":"/appsec-portal/features/scanners/scanner-description/infrastructure-scanners/aws-security-hub-scan","siteSpaceId":"sitesp_INYPE","description":"AWS Security Hub Scan is a robust security scanning tool designed to analyze and assess the security posture of your AWS environments.","breadcrumbs":[{"label":"AppSec Portal"},{"label":"Features","emoji":"1f3af"},{"label":"Scanners","emoji":"1f52c"},{"label":"Scanner description","icon":"subtitles"},{"label":"Infrastructure Scanners","icon":"cloud"}]},{"id":"Gqqa90UdOZukaYsFstCE","title":"Importing reports via AWS Lambda Function within AWS Security Hub","pathname":"/appsec-portal/features/scanners/scanner-description/infrastructure-scanners/aws-security-hub-scan/importing-reports-via-aws-lambda-function-within-aws-security-hub","siteSpaceId":"sitesp_INYPE","description":"To send scanning data to AWS Security Hub on AppSec Portal","breadcrumbs":[{"label":"AppSec Portal"},{"label":"Features","emoji":"1f3af"},{"label":"Scanners","emoji":"1f52c"},{"label":"Scanner description","icon":"subtitles"},{"label":"Infrastructure Scanners","icon":"cloud"},{"label":"AWS Security Hub Scan"}]},{"id":"C3za9LIW7jzzwhLlf7Ko","title":"Prowler","pathname":"/appsec-portal/features/scanners/scanner-description/infrastructure-scanners/prowler","siteSpaceId":"sitesp_INYPE","description":"Open Source security tool to perform AWS, GCP and Azure security","breadcrumbs":[{"label":"AppSec Portal"},{"label":"Features","emoji":"1f3af"},{"label":"Scanners","emoji":"1f52c"},{"label":"Scanner description","icon":"subtitles"},{"label":"Infrastructure Scanners","icon":"cloud"}]},{"id":"qR6J6QwsBcU7kOOG5SDy","title":"Subfinder","pathname":"/appsec-portal/features/scanners/scanner-description/infrastructure-scanners/subfinder","siteSpaceId":"sitesp_INYPE","description":"Fast passive subdomain enumeration tool","breadcrumbs":[{"label":"AppSec Portal"},{"label":"Features","emoji":"1f3af"},{"label":"Scanners","emoji":"1f52c"},{"label":"Scanner description","icon":"subtitles"},{"label":"Infrastructure Scanners","icon":"cloud"}]},{"id":"4wMTyZCbAXnvLS58ANpm","title":"Nessus","pathname":"/appsec-portal/features/scanners/scanner-description/infrastructure-scanners/nessus","siteSpaceId":"sitesp_INYPE","description":"","breadcrumbs":[{"label":"AppSec Portal"},{"label":"Features","emoji":"1f3af"},{"label":"Scanners","emoji":"1f52c"},{"label":"Scanner description","icon":"subtitles"},{"label":"Infrastructure Scanners","icon":"cloud"}]},{"id":"u5wg3CZx7N1K3ritD31L","title":"Nuclei","pathname":"/appsec-portal/features/scanners/scanner-description/infrastructure-scanners/nuclei","siteSpaceId":"sitesp_INYPE","description":"Nuclei is an open-source project that enables automated detection and exploitation of vulnerabilities in web applications.","breadcrumbs":[{"label":"AppSec Portal"},{"label":"Features","emoji":"1f3af"},{"label":"Scanners","emoji":"1f52c"},{"label":"Scanner description","icon":"subtitles"},{"label":"Infrastructure Scanners","icon":"cloud"}]},{"id":"pRjA5aRMRYBFzJziK25u","title":"Mobile Security Scanners","pathname":"/appsec-portal/features/scanners/scanner-description/mobile-security-scanners","siteSpaceId":"sitesp_INYPE","icon":"mobile","breadcrumbs":[{"label":"AppSec Portal"},{"label":"Features","emoji":"1f3af"},{"label":"Scanners","emoji":"1f52c"},{"label":"Scanner description","icon":"subtitles"}]},{"id":"kHZCoKfXa5fQhh7AesWs","title":"MobSFScan","pathname":"/appsec-portal/features/scanners/scanner-description/mobile-security-scanners/mobsfscan","siteSpaceId":"sitesp_INYPE","breadcrumbs":[{"label":"AppSec Portal"},{"label":"Features","emoji":"1f3af"},{"label":"Scanners","emoji":"1f52c"},{"label":"Scanner description","icon":"subtitles"},{"label":"Mobile Security Scanners","icon":"mobile"}]},{"id":"6eHZ24VxWKY5s60UMMKb","title":"Other Scanners","pathname":"/appsec-portal/features/scanners/scanner-description/other-scanners","siteSpaceId":"sitesp_INYPE","icon":"ethernet","breadcrumbs":[{"label":"AppSec Portal"},{"label":"Features","emoji":"1f3af"},{"label":"Scanners","emoji":"1f52c"},{"label":"Scanner description","icon":"subtitles"}]},{"id":"bwj6cb1Gkhis4mggk41n","title":"Dependency-Track","pathname":"/appsec-portal/features/scanners/scanner-description/other-scanners/dependency-track","siteSpaceId":"sitesp_INYPE","breadcrumbs":[{"label":"AppSec Portal"},{"label":"Features","emoji":"1f3af"},{"label":"Scanners","emoji":"1f52c"},{"label":"Scanner description","icon":"subtitles"},{"label":"Other Scanners","icon":"ethernet"}]},{"id":"VMsiJHt36lprswEwZsPg","title":"Whitespots Portal","pathname":"/appsec-portal/features/scanners/scanner-description/other-scanners/whitespots-portal","siteSpaceId":"sitesp_INYPE","breadcrumbs":[{"label":"AppSec Portal"},{"label":"Features","emoji":"1f3af"},{"label":"Scanners","emoji":"1f52c"},{"label":"Scanner description","icon":"subtitles"},{"label":"Other Scanners","icon":"ethernet"}]},{"id":"pxGT9z1u2szOJtFLd0qN","title":"Working with products","pathname":"/appsec-portal/features/working-with-products","siteSpaceId":"sitesp_INYPE","emoji":"1f4e6","description":"Get a better understanding of what's really at risk, product by product, with the informative Products tab","breadcrumbs":[{"label":"AppSec Portal"},{"label":"Features","emoji":"1f3af"}]},{"id":"75p6cgQRgGKoRWR4KHso","title":"Product Creation","pathname":"/appsec-portal/features/working-with-products/product-creation","siteSpaceId":"sitesp_INYPE","description":"","breadcrumbs":[{"label":"AppSec Portal"},{"label":"Features","emoji":"1f3af"},{"label":"Working with products","emoji":"1f4e6"}]},{"id":"wrdH7nFG6ShaOd3jCWDk","title":"Product options","pathname":"/appsec-portal/features/working-with-products/product-options","siteSpaceId":"sitesp_INYPE","description":"","breadcrumbs":[{"label":"AppSec Portal"},{"label":"Features","emoji":"1f3af"},{"label":"Working with products","emoji":"1f4e6"}]},{"id":"3CbAHCKSHtB5iE73A5jO","title":"Finding groups","pathname":"/appsec-portal/features/working-with-products/finding-groups","siteSpaceId":"sitesp_INYPE","breadcrumbs":[{"label":"AppSec Portal"},{"label":"Features","emoji":"1f3af"},{"label":"Working with products","emoji":"1f4e6"}]},{"id":"5wBkDadD1m2QKcSAg2uk","title":"Risk assessment","pathname":"/appsec-portal/features/working-with-products/risk-assessment","siteSpaceId":"sitesp_INYPE","description":"","breadcrumbs":[{"label":"AppSec Portal"},{"label":"Features","emoji":"1f3af"},{"label":"Working with products","emoji":"1f4e6"}]},{"id":"5DLdC66hmxNVENKt3Clz","title":"Product Asset","pathname":"/appsec-portal/features/working-with-products/product-asset","siteSpaceId":"sitesp_INYPE","description":"","breadcrumbs":[{"label":"AppSec Portal"},{"label":"Features","emoji":"1f3af"},{"label":"Working with products","emoji":"1f4e6"}]},{"id":"atb3lEaaO3eVBeSaDF1r","title":"Quality Gate","pathname":"/appsec-portal/features/quality-gate","siteSpaceId":"sitesp_INYPE","icon":"dungeon","breadcrumbs":[{"label":"AppSec Portal"},{"label":"Features","emoji":"1f3af"}]},{"id":"jZN1LcJXMiwmpKqxdEI2","title":"Bring your own scanner","pathname":"/appsec-portal/features/bring-your-own-scanner","siteSpaceId":"sitesp_INYPE","breadcrumbs":[{"label":"AppSec Portal"},{"label":"Features","emoji":"1f3af"}]},{"id":"BFtMHhrlRBnuj0pHDC5f","title":"General Portal settings","pathname":"/appsec-portal/general-portal-settings","siteSpaceId":"sitesp_INYPE","emoji":"1f6e0","description":"General AppSec Portal settings description","breadcrumbs":[{"label":"AppSec Portal"}]},{"id":"BSxdUOD1Gso91MaKW5EJ","title":"Version Control Integration","pathname":"/appsec-portal/general-portal-settings/version-control-integration","siteSpaceId":"sitesp_INYPE","description":"","breadcrumbs":[{"label":"AppSec Portal"},{"label":"General Portal settings","emoji":"1f6e0"}]},{"id":"ATBf9oUwLdgdfhzlj84K","title":"Profile","pathname":"/appsec-portal/general-portal-settings/profile","siteSpaceId":"sitesp_INYPE","breadcrumbs":[{"label":"AppSec Portal"},{"label":"General Portal settings","emoji":"1f6e0"}]},{"id":"JlHu2CBsnnTu1XTyWyJg","title":"Managing user roles and access control","pathname":"/appsec-portal/general-portal-settings/managing-user-roles-and-access-control","siteSpaceId":"sitesp_INYPE","description":"","breadcrumbs":[{"label":"AppSec Portal"},{"label":"General Portal settings","emoji":"1f6e0"}]},{"id":"r5Ox6HH65rq6eNgdPLqD","title":"User management","pathname":"/appsec-portal/general-portal-settings/managing-user-roles-and-access-control/user-management","siteSpaceId":"sitesp_INYPE","description":"User management in the AppSec Portal allows superusers to effectively manage user accounts, roles, and access control within the platform.","breadcrumbs":[{"label":"AppSec Portal"},{"label":"General Portal settings","emoji":"1f6e0"},{"label":"Managing user roles and access control"}]},{"id":"jKWEP88hFHg42G4tyjPx","title":"Creating and editing roles","pathname":"/appsec-portal/general-portal-settings/managing-user-roles-and-access-control/creating-and-editing-roles","siteSpaceId":"sitesp_INYPE","description":"Roles in the AppSec Portal define the access permissions and privileges granted to users within the platform.","breadcrumbs":[{"label":"AppSec Portal"},{"label":"General Portal settings","emoji":"1f6e0"},{"label":"Managing user roles and access control"}]},{"id":"yX9uLVoQtYQLJth0U6XZ","title":"SSO settings","pathname":"/appsec-portal/general-portal-settings/sso-settings","siteSpaceId":"sitesp_INYPE","description":"Setting Up Single Sign-On (SSO) in AppSec Portal","breadcrumbs":[{"label":"AppSec Portal"},{"label":"General Portal settings","emoji":"1f6e0"}]},{"id":"u8oIClSDSXiza99bzMVQ","title":"GitLab SSO","pathname":"/appsec-portal/general-portal-settings/sso-settings/gitlab-sso","siteSpaceId":"sitesp_INYPE","breadcrumbs":[{"label":"AppSec Portal"},{"label":"General Portal settings","emoji":"1f6e0"},{"label":"SSO settings"}]},{"id":"l5A7od51L5Q0VR3Fy8XY","title":"Microsoft SSO","pathname":"/appsec-portal/general-portal-settings/sso-settings/microsoft-sso","siteSpaceId":"sitesp_INYPE","breadcrumbs":[{"label":"AppSec Portal"},{"label":"General Portal settings","emoji":"1f6e0"},{"label":"SSO settings"}]},{"id":"wtBQDIrrTuXmELox2YQU","title":"Okta SSO","pathname":"/appsec-portal/general-portal-settings/sso-settings/okta-sso","siteSpaceId":"sitesp_INYPE","breadcrumbs":[{"label":"AppSec Portal"},{"label":"General Portal settings","emoji":"1f6e0"},{"label":"SSO settings"}]},{"id":"u5T73u5ePtXlTJUmnoiR","title":"Scanner settings","pathname":"/appsec-portal/general-portal-settings/scanner-settings","siteSpaceId":"sitesp_INYPE","description":"Scanner settings in AppSec Portal allow you to customize settings for the supported scanners.","breadcrumbs":[{"label":"AppSec Portal"},{"label":"General Portal settings","emoji":"1f6e0"}]},{"id":"TIgfj0OP2PR8fAFnQa16","title":"Auto Closer","pathname":"/appsec-portal/general-portal-settings/scanner-settings/auto-closer","siteSpaceId":"sitesp_INYPE","description":"","breadcrumbs":[{"label":"AppSec Portal"},{"label":"General Portal settings","emoji":"1f6e0"},{"label":"Scanner settings"}]},{"id":"KHU7DkuoL7PpsUeW8dCG","title":"Group findings by","pathname":"/appsec-portal/general-portal-settings/scanner-settings/group-findings-by","siteSpaceId":"sitesp_INYPE","breadcrumbs":[{"label":"AppSec Portal"},{"label":"General Portal settings","emoji":"1f6e0"},{"label":"Scanner settings"}]},{"id":"6EBnpvKDs62siq0iIwjV","title":"Custom Jira description","pathname":"/appsec-portal/general-portal-settings/scanner-settings/custom-jira-description","siteSpaceId":"sitesp_INYPE","breadcrumbs":[{"label":"AppSec Portal"},{"label":"General Portal settings","emoji":"1f6e0"},{"label":"Scanner settings"}]},{"id":"9Rcf6IrS3YrLUyXc7Zhi","title":"Custom severity mapping","pathname":"/appsec-portal/general-portal-settings/scanner-settings/custom-severity-mapping","siteSpaceId":"sitesp_INYPE","breadcrumbs":[{"label":"AppSec Portal"},{"label":"General Portal settings","emoji":"1f6e0"},{"label":"Scanner settings"}]},{"id":"2icIcuQ11Wb7m51oj43U","title":"Auditor Job Config","pathname":"/appsec-portal/general-portal-settings/scanner-settings/auditor-job-config","siteSpaceId":"sitesp_INYPE","breadcrumbs":[{"label":"AppSec Portal"},{"label":"General Portal settings","emoji":"1f6e0"},{"label":"Scanner settings"}]},{"id":"qRqSU7KfXeEzLQwz5iK1","title":"Notification settings","pathname":"/appsec-portal/general-portal-settings/notification-settings","siteSpaceId":"sitesp_INYPE","breadcrumbs":[{"label":"AppSec Portal"},{"label":"General Portal settings","emoji":"1f6e0"}]},{"id":"xM1h9bu5Yb2z0LbjKNUZ","title":"Integration","pathname":"/appsec-portal/general-portal-settings/notification-settings/integration","siteSpaceId":"sitesp_INYPE","breadcrumbs":[{"label":"AppSec Portal"},{"label":"General Portal settings","emoji":"1f6e0"},{"label":"Notification settings"}]},{"id":"c4zf3hCXzs4pCzCLQH2V","title":"Criteria & Schedule","pathname":"/appsec-portal/general-portal-settings/notification-settings/criteria-and-schedule","siteSpaceId":"sitesp_INYPE","breadcrumbs":[{"label":"AppSec Portal"},{"label":"General Portal settings","emoji":"1f6e0"},{"label":"Notification settings"}]},{"id":"vCHb8TzuGdiAGJ50C1rH","title":"Status change notification","pathname":"/appsec-portal/general-portal-settings/notification-settings/status-change-notification","siteSpaceId":"sitesp_INYPE","breadcrumbs":[{"label":"AppSec Portal"},{"label":"General Portal settings","emoji":"1f6e0"},{"label":"Notification settings"}]},{"id":"GInmrgd1gWl7959oz7FC","title":"Manage notification schedule","pathname":"/appsec-portal/general-portal-settings/notification-settings/manage-notification-schedule","siteSpaceId":"sitesp_INYPE","breadcrumbs":[{"label":"AppSec Portal"},{"label":"General Portal settings","emoji":"1f6e0"},{"label":"Notification settings"}]},{"id":"FDmkBLwgIu4xE3gakihy","title":"Repository Link Configs","pathname":"/appsec-portal/general-portal-settings/repository-link-configs","siteSpaceId":"sitesp_INYPE","description":"","breadcrumbs":[{"label":"AppSec Portal"},{"label":"General Portal settings","emoji":"1f6e0"}]},{"id":"qAiqD8ABi2wXdSggj0EY","title":"CWE list","pathname":"/appsec-portal/general-portal-settings/cwe-list","siteSpaceId":"sitesp_INYPE","breadcrumbs":[{"label":"AppSec Portal"},{"label":"General Portal settings","emoji":"1f6e0"}]},{"id":"YKyL1tQKiilL2fP1PdXm","title":"Tag screen","pathname":"/appsec-portal/general-portal-settings/tag-screen","siteSpaceId":"sitesp_INYPE","description":"","breadcrumbs":[{"label":"AppSec Portal"},{"label":"General Portal settings","emoji":"1f6e0"}]},{"id":"uVcKRmIM5NrjsYN3M5Ty","title":"Release notes","pathname":"/appsec-portal/release-notes","siteSpaceId":"sitesp_INYPE","emoji":"1f5d2","description":"","breadcrumbs":[{"label":"AppSec Portal"}]},{"id":"vML4znGlKG1kt9O3qUXl","title":"Auditor","pathname":"/auditor","siteSpaceId":"sitesp_INYPE"},{"id":"ves5M0TeKxeEQCTStggZ","title":"Deployment","pathname":"/auditor/deployment","siteSpaceId":"sitesp_INYPE","emoji":"1f4e6","description":"Auditor step-by-step deployment guide","breadcrumbs":[{"label":"Auditor"}]},{"id":"HoCnNZORNlCZ6dLB24mR","title":"Features","pathname":"/auditor/features","siteSpaceId":"sitesp_INYPE","emoji":"1f3af","description":"","breadcrumbs":[{"label":"Auditor"}]},{"id":"o2wtMNyHIWhRCCQPiNVM","title":"Run Audit","pathname":"/auditor/features/run-audit","siteSpaceId":"sitesp_INYPE","emoji":"1f680","breadcrumbs":[{"label":"Auditor"},{"label":"Features","emoji":"1f3af"}]},{"id":"2G48ExkwjEDOgZrcJH4r","title":"AppSec Portal cooperation","pathname":"/auditor/features/run-audit/appsec-portal-cooperation","siteSpaceId":"sitesp_INYPE","breadcrumbs":[{"label":"Auditor"},{"label":"Features","emoji":"1f3af"},{"label":"Run Audit","emoji":"1f680"}]},{"id":"TZzSruMcEdAllZuQpeYu","title":"Direct use of Auditor","pathname":"/auditor/features/run-audit/direct-use-of-auditor","siteSpaceId":"sitesp_INYPE","breadcrumbs":[{"label":"Auditor"},{"label":"Features","emoji":"1f3af"},{"label":"Run Audit","emoji":"1f680"}]},{"id":"DFzbdebNJLPJdNPnfyBD","title":"Settings","pathname":"/auditor/features/settings","siteSpaceId":"sitesp_INYPE","emoji":"2699","breadcrumbs":[{"label":"Auditor"},{"label":"Features","emoji":"1f3af"}]},{"id":"XHrFzGgLcMxnEAxKYnQn","title":"AppSec Portal cooperation","pathname":"/auditor/features/settings/appsec-portal-cooperation","siteSpaceId":"sitesp_INYPE","breadcrumbs":[{"label":"Auditor"},{"label":"Features","emoji":"1f3af"},{"label":"Settings","emoji":"2699"}]},{"id":"ocj4ge0R81PGpZT4hBGX","title":"Direct use of the Auditor","pathname":"/auditor/features/settings/direct-use-of-the-auditor","siteSpaceId":"sitesp_INYPE","breadcrumbs":[{"label":"Auditor"},{"label":"Features","emoji":"1f3af"},{"label":"Settings","emoji":"2699"}]},{"id":"DCov8JXUYliU7gpNoh5w","title":"Cleaner","pathname":"/auditor/features/settings/direct-use-of-the-auditor/cleaner","siteSpaceId":"sitesp_INYPE","breadcrumbs":[{"label":"Auditor"},{"label":"Features","emoji":"1f3af"},{"label":"Settings","emoji":"2699"},{"label":"Direct use of the Auditor"}]},{"id":"pumcWEasVzS6u9331QMP","title":"Docker Credentials","pathname":"/auditor/features/settings/direct-use-of-the-auditor/docker-credentials","siteSpaceId":"sitesp_INYPE","breadcrumbs":[{"label":"Auditor"},{"label":"Features","emoji":"1f3af"},{"label":"Settings","emoji":"2699"},{"label":"Direct use of the Auditor"}]},{"id":"gk1l4I4AH7eF1VdPs68Q","title":"Workers","pathname":"/auditor/features/settings/direct-use-of-the-auditor/workers","siteSpaceId":"sitesp_INYPE","breadcrumbs":[{"label":"Auditor"},{"label":"Features","emoji":"1f3af"},{"label":"Settings","emoji":"2699"},{"label":"Direct use of the Auditor"}]},{"id":"HeQFtqcpcuMl1bO1hbBZ","title":"Personalization","pathname":"/auditor/features/settings/direct-use-of-the-auditor/personalization","siteSpaceId":"sitesp_INYPE","breadcrumbs":[{"label":"Auditor"},{"label":"Features","emoji":"1f3af"},{"label":"Settings","emoji":"2699"},{"label":"Direct use of the Auditor"}]},{"id":"CrEsYQomxNPDHdaxhrMC","title":"Jobs","pathname":"/auditor/features/settings/jobs","siteSpaceId":"sitesp_INYPE","breadcrumbs":[{"label":"Auditor"},{"label":"Features","emoji":"1f3af"},{"label":"Settings","emoji":"2699"}]},{"id":"yT03x7lXOcfxObf6naxV","title":"Technical Jobs","pathname":"/auditor/features/settings/jobs/technical-jobs","siteSpaceId":"sitesp_INYPE","breadcrumbs":[{"label":"Auditor"},{"label":"Features","emoji":"1f3af"},{"label":"Settings","emoji":"2699"},{"label":"Jobs"}]},{"id":"wXFSF4Hc3wCqLYA7LsXG","title":"Scanner Jobs","pathname":"/auditor/features/settings/jobs/scanner-jobs","siteSpaceId":"sitesp_INYPE","breadcrumbs":[{"label":"Auditor"},{"label":"Features","emoji":"1f3af"},{"label":"Settings","emoji":"2699"},{"label":"Jobs"}]},{"id":"PdVguVpYbHjiPyIgUHb8","title":"Job configuration","pathname":"/auditor/features/settings/jobs/job-configuration","siteSpaceId":"sitesp_INYPE","breadcrumbs":[{"label":"Auditor"},{"label":"Features","emoji":"1f3af"},{"label":"Settings","emoji":"2699"},{"label":"Jobs"}]},{"id":"zMxcvAOo0uIDum1VHkcZ","title":"Release notes","pathname":"/auditor/release-notes","siteSpaceId":"sitesp_INYPE","emoji":"1f5d2","description":"","breadcrumbs":[{"label":"Auditor"}]},{"id":"5NkylAo7XXRbaoTf87bF","title":"Maintenance","pathname":"/auditor/maintenance","siteSpaceId":"sitesp_INYPE","emoji":"1fa7c","breadcrumbs":[{"label":"Auditor"}]},{"id":"V1jbIO6yaYSWTeGDXrhK","title":"Documentation backlog","pathname":"/to-be-described/documentation-backlog","siteSpaceId":"sitesp_INYPE","breadcrumbs":[{"label":"To be described"}]}]}