What a Vulnerability Includes
- The affected repository and code location
- Severity level
- A description of the exploit path and potential impact
- An AI-generated fix suggestion
- The policy that triggered it
- The source (scan, PR review, or guardrail)
Severity
Severity prioritizes which issues to address first. Higher severity vulnerabilities can be configured to block pull requests from merging via your enforcement type settings.Triaging
From the Vulnerabilities view you can:- Filter by repository, severity, scan type, or source
- Review the full context of each finding
- Mark findings as resolved once fixed
- Dismiss false positives with a justification

