doc/user/application_security/sast/evaluation_guide.md
{{< details >}}
{{< /details >}}
You might choose to evaluate GitLab SAST before using it in your organization. Consider the following guidance as you plan and conduct your evaluation.
GitLab SAST is designed to help teams collaboratively improve the security of the code they write. The steps you take to scan your code and view the results are centered around the source code repository being scanned.
GitLab SAST automatically selects the right scanning technology to use depending on which programming languages are found in your project. For all languages except Groovy, GitLab SAST scans your source code directly without requiring a compilation or build step. This makes it easier to enable scanning across a variety of projects. For details, see Supported languages and frameworks.
GitLab SAST analyzers and their rules are designed to minimize noise for development and security teams.
For details on when the GitLab Advanced SAST analyzer reports vulnerabilities, see Vulnerability detection criteria.
SAST is integrated with other security and compliance features in GitLab Ultimate. If you're comparing GitLab SAST to another product, you may find that some of its features are included in a related GitLab feature area instead of SAST:
When choosing a codebase to test SAST, you should:
Your test project must have GitLab Ultimate. Only Ultimate includes features like:
If you choose to use a benchmark or an intentionally vulnerable application for testing, remember that these applications:
Epic 15296 tracks work to recommend specific projects for testing.
You should not use AI tools to create vulnerable code for testing SAST. AI models often return code that is not truly exploitable.
For example:
Reporting vulnerabilities in these unrealistic examples would cause false-positive results in real-world code. GitLab SAST is not designed to report vulnerabilities in these cases.
Prerequisites:
After you choose a codebase to test with, you're ready to conduct the test. You can follow these steps: