doc/user/application_security/vulnerabilities/agentic_vulnerability_resolution.md
{{< details >}}
{{< /details >}}
{{< history >}}
enable_vulnerability_resolution and agentic_sast_vr_ui. Enabled by default.{{< /history >}}
GitLab Duo automatically analyzes SAST vulnerabilities and generates merge requests with context-aware code fixes. This agentic approach uses multi-shot reasoning to resolve vulnerabilities with minimal human intervention, reducing remediation time and improving security outcomes.
Unlike the single-shot vulnerability resolution, agentic vulnerability resolution uses iterative reasoning to:
Agentic SAST vulnerability resolution can run automatically, or you can run it manually.
For a click-through demo, see Agentic SAST Vulnerability Resolution.
<!-- Demo published on 2026-03-05 -->When a SAST security scan completes on the main branch, GitLab Duo automatically completes the following actions:
The process runs in the background with no manual triggering required. Results appear in the vulnerability report once processing is complete.
You can manually trigger agentic vulnerability resolution for any SAST vulnerability at any time, regardless of severity. See manual trigger for instructions.
Automatic agentic vulnerability resolution runs when all of the following conditions are met:
The analysis happens in the background and results appear in the vulnerability report after processing is complete.
To manually run agentic vulnerability resolution for any existing SAST vulnerability:
GitLab Duo analyzes the vulnerability and generates a merge request if a fix can be produced. Manual resolution works on any SAST vulnerability regardless of severity.
To use agentic vulnerability resolution, you must have the following requirements configured:
You can allow all the projects in a top-level group to use the foundational flow. Individual projects must still turn on the feature in their project settings.
To allow agentic vulnerability resolution for all projects in a top-level group:
To turn on the feature for a specific project:
When you allow agentic vulnerability resolution for the top-level group and turn it on for the project, the feature works automatically with your existing SAST scanners.
The following occurs when GitLab Duo generates a merge request for a vulnerability:
Agentic vulnerability resolution sometimes cannot generate a suggested fix. Common causes include:
an unexpected error has occurred, the upstream AI provider request timed out, something went wrong, or a similar
cause.
We welcome your feedback on agentic vulnerability resolution. If you encounter issues or have suggestions for improvement, please provide feedback in issue 585626.