Skip to content

Technical Discovery: Custom analyzer rulesets for SAST & Secret Detection analyzers

Problem to solve

As a security analyst or maintainer, I want the ability to extend the rules for each analyzer on a project-by-project bases, so that I can reduce false positives or provide coverage beyond the rules shipped by default by GitLab.

Today, we rely on open source software to be both the detection engine as well as the detection rules. However, we have a growing need to allow us (or customers) to extend those rules. This would allow us a mechanism to try out rules that reduce false positive rates, provide coverage we do not currently offer, or both.

Proposal

Further details

We need to learn the following:

What does success look like, and how can we measure that?

Links / references

Edited by Taylor McCaslin