--- stage: Secure group: Static Analysis info: To determine the technical writer assigned to the Stage/Group associated with this page, see https://about.gitlab.com/handbook/engineering/ux/technical-writing/#assignments type: reference --- # Secure and Protect terminology **(FREE)** This terminology list for GitLab Secure and Protect aims to: - Promote a ubiquitous language for discussing application security. - Improve the effectiveness of communication regarding GitLab application security features. - Get new contributors up to speed faster. This document defines application security terms in the specific context of GitLab Secure and Protect features. Terms may therefore have different meanings outside that context. ## Terms ### Analyzer Software that performs a scan. The scan analyzes an attack surface for vulnerabilities and produces a report containing findings. Reports adhere to the [Secure report format](#secure-report-format). Analyzers integrate into GitLab using a CI job. The report produced by the analyzer is published as an artifact after the job is complete. GitLab ingests this report, allowing users to visualize and manage found vulnerabilities. For more information, see [Security Scanner Integration](../../../development/integrations/secure.md). Many GitLab analyzers follow a standard approach using Docker to run a wrapped scanner. For example, the Docker image `bandit-sast` is an analyzer that wraps the scanner `Bandit`. You can optionally use the [Common library](https://gitlab.com/gitlab-org/security-products/analyzers/common) to assist in building an Analyzer. ### Attack surface The different places in an application that are vulnerable to attack. Secure products discover and search the attack surface during scans. Each product defines the attack surface differently. For example, SAST uses files and line numbers, and DAST uses URLs. ### Corpus The set of meaningful test cases that are generated while the fuzzer is running. Each meaningful test case produces new coverage in the tested program. It's advised to re-use the corpus and pass it to subsequent runs. ### CVE Common Vulnerabilities and Exposures (CVE®) is a list of common identifiers for publicly known cybersecurity vulnerabilities. The list is managed by the [Mitre Corporation](https://cve.mitre.org/). ### CVSS The Common Vulnerability Scoring System (CVSS) is a free and open industry standard for assessing the severity of computer system security vulnerabilities. ### CWE Common Weakness Enumeration (CWE™) is a community-developed list of common software and hardware weakness types that have security ramifications. Weaknesses are flaws, faults, bugs, vulnerabilities, or other errors in software or hardware implementation, code, design, or architecture. If left unaddressed, weaknesses could result in systems, networks, or hardware being vulnerable to attack. The CWE List and associated classification taxonomy serve as a language that you can use to identify and describe these weaknesses in terms of CWEs. ### Duplicate finding A legitimate finding that is reported multiple times. This can occur when different scanners discover the same finding, or when a single scan inadvertently reports the same finding more than once. ### False positive A finding that doesn't exist but is incorrectly reported as existing. ### Feedback Feedback the user provides about a finding. Types of feedback include dismissal, creating an issue, or creating a merge request. ### Finding An asset that has the potential to be vulnerable, identified in a project by an analyzer. Assets include but are not restricted to source code, binary packages, containers, dependencies, networks, applications, and infrastructure. Findings are all potential vulnerability items scanners identify in MRs/feature branches. Only after merging to default does a finding become a [vulnerability](#vulnerability). ### Insignificant finding A legitimate finding that a particular customer doesn't care about. ### Location fingerprint A finding's location fingerprint is a text value that's unique for each location on the attack surface. Each Secure product defines this according to its type of attack surface. For example, SAST incorporates file path and line number. ### Package managers A Package manager is a system that manages your project dependencies. The package manager provides a method to install new dependencies (also referred to as "packages"), manage where packages are stored on your file system, and offer capabilities for you to publish your own packages. ### Package types Each package manager, platform, type, or ecosystem has its own conventions and protocols to identify, locate, and provision software packages. The following table is a non-exhaustive list of some of the package managers and types referenced in GitLab documentation and software tools.
Package Type | Package Manager |
---|---|
gem | bundler |
packagist | composer |
conan | conan |
go | go |
maven | gradle |
maven | |
sbt | |
npm | npm |
yarn | |
nuget | nuget |
pypi | setuptools |
pip | |
Pipenv | |
Poetry |