Files
compliance-scanner-agent/docs/features/impact-analysis.md
Sharang Parnerkar 7e12d1433a
All checks were successful
CI / Clippy (push) Successful in 3m17s
CI / Security Audit (push) Successful in 1m36s
CI / Format (push) Successful in 2s
CI / Tests (push) Successful in 4m38s
docs: added vite-press docs (#4)
Co-authored-by: Sharang Parnerkar <parnerkarsharang@gmail.com>
Reviewed-on: #4
2026-03-08 13:59:50 +00:00

1.8 KiB

Impact Analysis

Impact Analysis uses the Code Knowledge Graph to determine the blast radius of a security finding. When a vulnerability is found in a specific function or file, impact analysis traces the call graph to show everything that could be affected.

Accessing Impact Analysis

Impact analysis is linked from the Graph Explorer. When viewing a repository's graph with findings, you can navigate to:

/graph/{repo_id}/impact/{finding_id}

What You See

Blast Radius

A count of the total number of code symbols (functions, methods, classes) affected by the vulnerability, both directly and transitively.

Entry Points Affected

A list of public entry points — main functions, HTTP handlers, API endpoints — that could be impacted by the vulnerable code. These represent the ways an attacker could potentially reach the vulnerability.

Call Chains

Complete call chain paths showing how execution flows from entry points through intermediate functions to the vulnerable code. Each chain shows the sequence of function calls.

Direct Callers

The immediate functions that call the vulnerable function. These are the first layer of impact.

How It Works

  1. The finding's file path and line number are matched to a node in the code graph
  2. The graph is traversed backwards along call edges to find all callers
  3. Entry points (functions with no callers, or known patterns like main, HTTP handlers) are identified
  4. All paths from entry points to the vulnerable node are computed

Use Cases

  • Prioritization — A critical vulnerability in a function called by 50 entry points is more urgent than one in dead code
  • Remediation scoping — Understand what tests need to run after a fix
  • Risk assessment — Quantify the actual exposure of a vulnerability