Endpoints

From the Endpoint page, viewing vulnerabilities on an endpoint basis becomes available as in the following image.

2495

Endpoints

Kondukto uses the Source Dir column information to automatically map vulnerabilities from SAST and SCA tools with relevant endpoints. Kondukto compares the file/path of SAST and SCA vulnerabilities with the source dir provided for each endpoint which you can provide in a regex or wildcard format.

If there is a match, Kondukto automatically maps the vulnerabilities to the endpoint with the matching source. For DAST vulnerabilities, Kondukto compares the target field of the vulnerability with the endpoint list. If the target contains any of the specified endpoints, the vulnerability is automatically mapped to that endpoint by Kondukto. The information captured in the Environment column is not yet functional but will be applicable in upcoming features.