Supported FP Rules

A false positive rule is a rule that Mobb executes against reported SAST findings to reliably identify if the code instances are not actually vulnerable.

All FP rules meet the following criteria:

  • High confidence that the identified finding is a false positive

  • Tested against real-world code samples to avoid suppressing true positives

  • Clear explanation is provided for why the finding is considered a false positive

Here are the categories of FP rules that Mobb currently supports. If there's an FP pattern you'd like to see added, please contact us at [email protected]envelope.

circle-info

Since different SAST tools may report false positives under inconsistent names, the issue names shown are normalized by Mobb.

chevron-rightList of Supported Issue Types for Snykhashtag

C#

GO

  • Command Injection

  • Hardcoded Non Crypto Secret

  • Hardcoded Non CryptoSecret Test

  • Hardcoded Password

  • Hardcoded Password Test

  • Hardcoded Secret Test

  • No Hardcoded Credentials

  • No Hardcoded Credentials Test

  • SQL Injection

Java

JavaScript / TypeScript

PHP

  • Hardcoded Credential

  • Hardcoded Credential Test

  • Hardcoded Non Crypto Secret

  • Hardcoded Password

  • Hardcoded Password Test

Python

chevron-rightList of Supported Issue Types for Fortifyhashtag

CPP

C#

DEFAULT

DOCKERFILE

GO

Java

JavaScript / TypeScript

PHP

Python

XML

YAML

chevron-rightList of Supported Issue Types for Checkmarxhashtag

C#

  • Dynamic SQL Queries

  • Hardcoded Credentials

  • Hardcoded password in Connection String

  • JWT Use Of Hardcoded Secret

  • Log Forging

  • Path Traversal

  • Reflected XSS

  • Reflected XSS All Clients

  • SQL Injection

  • Stored XSS

  • Use Of Broken Or Risky Cryptographic Algorithm

  • Use Of Hardcoded Password

  • Use of Insufficiently Random Values

GO

  • Command Injection

  • Hardcoded AWS Credentials

  • Hardcoded Password in Connection String

  • Log Forging

  • Second Order SQL Injection

  • SQL Injection

  • Use of Hardcoded Password

Java

JavaScript / TypeScript

PHP

  • Hardcoded Salt

  • Use of Hardcoded Cryptographic IV

  • Use Of Hardcoded Password

Python

chevron-rightList of Supported Issue Types for SonarQubehashtag

C#

DEFAULT

DOCKERFILE

GO

  • Constructing arguments of system commands from user input is security-sensitive

  • Database queries should not be vulnerable to injection attacks

  • Formatting SQL queries is security-sensitive

  • Using weak hashing algorithms is security-sensitive

Java

JavaScript / TypeScript

PHP

Python

YAML

chevron-rightList of Supported Issue Types for CodeQLhashtag

CPP

C#

GO

Java

JavaScript / TypeScript

Python

chevron-rightList of Supported Issue Types for Semgrep/Opengrephashtag

C#

DEFAULT

DOCKERFILE

GO

Java

JavaScript / TypeScript

Python

SQL

YAML

chevron-rightList of Supported Issue Types for Datadoghashtag

Last updated