Checker Configuration

You can substantially reduce the number of vulnerability detections without compromising on their significance just by fine-tuning the checker configuration.

Perform some typical testing activities to generate traffic in your application, and explore the collected results.

Investigate checker spikes

Take a close look at the checkers that generate unproportionally numerous results, for example, if you get 900 of Weak Hash checker detections out of 1000 detections.

Some of these checkers might be irrelevant for your use case. For example, many Insufficient SSL Enforcement detections when you are intentionally using HTTP rather than HTTPS in your test environment.

Tip:

You can disable such checkers for a project or project template, as described in Configure Vulnerability Checkers.

Review aggregation rules

Aggregation rules instruct Seeker how to aggregate multiple similar detections into one vulnerability. Their default settings might not be strong enough for particular checkers generating too many results, so you can try to fine-tune these rules.

For example, if you have a function that applies a weak hash algorithm such as MD5, you might find Weak Hash vulnerabilities reported for every single endpoint that uses this function. To avoid this, change the By endpoint aggregation condition to Disabled. As a result, all this checker's detections for different endpoints will be aggregated into one vulnerability.

For instructions, see Configure Aggregation Rules.