doc/user/application_security/vulnerabilities/false_positive_detection.md
{{< details >}}
{{< /details >}}
{{< history >}}
enable_vulnerability_fp_detection and ai_experiment_sast_fp_detection. Enabled by default.{{< /history >}}
When a static application security testing (SAST) scan runs, GitLab Duo automatically analyzes each Critical and High severity SAST vulnerabilities to determine the likelihood that it's a false positive. Detection is available for vulnerabilities from GitLab-supported SAST analyzers.
The GitLab Duo assessment includes:
The detection runs automatically after each security scan with no manual triggering required.
Results are based on AI analysis and should be reviewed by security professionals. The feature requires GitLab Duo with an active subscription.
<i class="fa-youtube-play" aria-hidden="true"></i> For an overview, see GitLab AI-Powered SAST False Positive Detection and Remediation.
<!-- Video published on 2026-03-20 -->For a click-through demo, see SAST False Positive Detection Flow.
<!-- Demo published on 2026-02-17 -->False positive detection runs automatically when:
The analysis happens in the background and results appear in the vulnerability report once processing is complete.
You can manually trigger false positive detection for existing vulnerabilities:
The GitLab Duo analysis runs and results are displayed on the vulnerability details page.
To use false positive detection, you must have:
False positive detection is turned off by default. To use this feature, you must enable the foundational flow for the group and turn on the feature for the project.
You can allow all projects in a group to use the foundational flow. Individual projects must still enable the feature in their project settings. To allow false positive detection for all projects in a group:
To turn on false positive detection for a specific project:
When you allow false positive detection for the group and turn it on for the project, the feature work works automatically with your existing SAST scanners.
The confidence score estimates how likely the GitLab Duo assessment is to be correct:
When the GitLab Duo analysis identifies a vulnerability as a false positive, you have the following options:
The vulnerability is marked as dismissed and does not appear in future scans unless it is reintroduced.
If you want to remove the false positive assessment and keep the vulnerability:
The false positive flag is removed and the FP confidence score reverts to 0. The vulnerability remains in the report and can be re-evaluated in future scans.
Share your feedback in issue 583697.