Jump to main content
HCL Logo Product Documentation
Customer Support Software Academy Community Forums
HCL AppScan on Cloud Help
  • Getting started
  • Navigation
  • Administration
  • Dynamic analysis
  • Interactive monitoring
  • Software Composition Analysis
  • Static analysis
  • Results
  • Troubleshooting
  • FAQ & Reference
  1. Home
  2. Static analysis

    Use static analysis (SAST) to scan for security vulnerabilities in web and desktop applications. Static analysis includes Intelligent Finding Analytics (IFA) and Intelligent Code Analytics (ICA).

  3. Scanning for security vulnerabilities

    To scan source code for security vulnerabilities, follow the steps in these topics.

  4. Static analysis integrations
  • Getting started

    Welcome to the documentation for HCL AppScan on Cloud, where you can find information about how to install, maintain, and use this service.

  • Navigation

    This section describes the items on the main AppScan on Cloud menu bar, with links to more detailed information.

  • Administration

    Define users, applications, policies, and configure DevOps integrations.

  • Dynamic analysis

    AppScan on Cloud performs security scans for web-applications for production, staging and development environments. For development environments it is aided by Private Site Scanning technology to scan applications not accessible to the open Internet.

  • Interactive monitoring

    Using an agent installed on your application, ASoC identifies security vulnerabilities in your application during runtime by monitoring all interactions, both legitimate and malicious. The process is "passive," in the sense that IAST does not send its own tests, and can therefore run indefinitely.

  • Software Composition Analysis

    Use Software Composition Analysis (SCA) to scan for security vulnerabilities in open source and third-party packages used by your code. SCA includes Intelligent Finding Analytics (IFA) and Intelligent Code Analytics (ICA).

  • Static analysis

    Use static analysis (SAST) to scan for security vulnerabilities in web and desktop applications. Static analysis includes Intelligent Finding Analytics (IFA) and Intelligent Code Analytics (ICA).

    • About static analysis (SAST)
    • System requirements for static analysis

      Supported operating systems and the types of files, locations, and projects that can be scanned by ASoC when you perform static analysis.

    • Scanning for security vulnerabilities

      To scan source code for security vulnerabilities, follow the steps in these topics.

      • Configure a scan in AppScan on Cloud

        Configure a static analysis scan.

      • Configuring a scan using AppScan Go!

        AppScan Go! steps you through configuring and running a static scan. You run the scan in the cloud or use a plugin to automate scanning.

      • Generating an IRX file using the command-line interface (CLI)

        To initiate an analysis of your files, you must generate an IRX file to submit for scanning. To use the CLI to generate the IRX file, follow these instructions.

      • Generating in IRX file using a plugin or IDE
      • About Software Composition Analysis

        Software Composition Analysis (SCA) identifies and examines open-source packages within your codebase to detect potential security vulnerabilities. SCA can analyze both individual source code files and package manager artifacts, such as configuration files, and lockfiles, to determine the open-source packages your project depends on.

      • Static analysis integrations
        • CodeSweep Github Action

          The HCL AppScan CodeSweep for GitHub action enables you to check your code on every pull request. The action identifies vulnerabilities in changed code with every update. But more than just identifying issues, the HCL AppScan CodeSweep for GitHub extension tells you what you need to know to mitigate issues — before they make it to the main branch.

        • ASoC and GitLab

          Use AppScan on Cloud with GitLab to run static analysis security testing (SAST) against the files in your repository on every merge request, thus preventing vulnerabilities from reaching the main branch. Results are stored in AppScan on Cloud.

        • SAST GitHub Action

          The AppScan SAST Github Action enables you to run static analysis security testing (SAST) against the files in your repository. The SAST scan identifies security vulnerabilities in your code and stores the results in AppScan on Cloud.

      • Submitting HCL AppScan Source assessments to the Cloud for analysis

        If you have a subscription to HCL AppScan on Cloud, you can submit AppScan Source assessments for analysis there. Assessments from AppScan Source Versions 9.0 or higher are supported. The number of scans you can submit depends on your ASoC subscription.

      • Best practices for Java scanning
      • Static analysis scan results

        The SAST scanning engine uses AI and complementary technologies to improve detection accuracy and streamline result analysis.

    • Sample apps and scripts

      Use these sample applications to practice scanning with ASoC.

    • Static analysis troubleshooting

      If you experience problems with static analysis, you can perform these troubleshooting tasks to determine the corrective action to take.

  • Results

    The Scans and Sessions page lists the scans under the categories DAST, SAST, SCA, and IAST, where you can view your scan results, including scan statistics. To view, rescan, or download reports, select a scan.

  • Troubleshooting

    If you experience problems with this service, you can perform these troubleshooting tasks to determine the corrective action to take.

  • FAQ & Reference

    Frequently asked questions, information about integrating ASoC into the product lifecycle (SDLC), and ASoC API documentation.

Static analysis integrations

HCL AppScan on Cloud has developed a number of integrations and extensions to further enhance security testing. For a full list of integrations, see Integrations.
  • CodeSweep GitHub Action
  • GitLab
  • SAST GitHub Action
  • Share: Email
  • Twitter
  • Disclaimer
  • Privacy
  • Terms of use
  • Cookie Preferences