Skip to main content

Overview

The Repositories Catalog provides complete visibility into all code repositories detected across your organization — including GitLab, GitHub, Bitbucket, or any connected developer platform.
AIM automatically aggregates repository data, identifies vulnerable or archived repos, and correlates each repo with associated assets, owners, and risk levels.

Repositories Catalog Overview


Key Metrics & Analytics

The top analytics panel gives teams an instant understanding of repository health and security posture.

Metrics Displayed

  • Total Repositories — Total number of repositories discovered across integrations.
  • Vulnerable Repositories — Repos associated with security issues or detected weaknesses.
  • Private Repositories — Internal or restricted-access repos (0 in screenshot).
  • Public Repositories — Repos exposed publicly (0 in screenshot).

Activity Dashboard

Repository Activity Distribution

The Activity Chart shows commit and update frequency across timelines (Last Week, Last Month, Last 3 Months, etc.).
This helps identify stagnant codebases, abandoned services, or actively developed projects.

Archive Status

Repository Archive Classification

AIM detects whether a repository is:
  • Archived — No longer maintained
  • Active — Still in use or being updated
Archived repos often contain legacy code and may still expose risks if dependencies or secrets remain.

Technology Distribution

Shows programming languages or tech stacks used across detected repositories.
(Empty in screenshot → will populate when tech metadata is available.)

Search, Filters & Sorting

To support deep analysis, users can filter repositories by:
FilterDescription
OwnersFilter repos by assigned owners or contributors.
RiskSort or filter via automated repository risk scoring.
ExposureIdentify repos linked with exposed assets.
AdaptersFilter by the integration source (e.g., GitLab adapter).
hasVulnsShow only repos containing vulnerabilities.
AssociationsFilter repositories connected to other AIM assets.
These filters help analysts quickly identify risky or abandoned codebases.

Repository Table Details

Each repository entry includes:
ColumnDescription
Asset ValueRepository URL or identifier.
SourceDetection method (e.g., gitlab).
Vuln CountTotal vulnerabilities linked with the repo.
Auto RiskAutomated risk score.
OwnerTeam or user responsible for maintaining the repository.
LanguagePrimary programming language (if detected).
AssociationsNumber of linked assets (apps, services, domains, etc.).
Pushed AtLast code push timestamp.
Created AtRepository creation timestamp.

Full Repository View

Each repository page contains:

Summary

  • Repository link
  • Ownership
  • Risk score
  • Activity timeline
  • Exposure / associations

Vulnerability Insights

If repositories are linked with VM or SAST findings, they appear here:
  • Severity breakdown
  • Discovery timeline
  • State and remediation history

Metadata & Language Detection

Programming language, frameworks, and package insights (when available).

Associations

Shows related applications, APIs, certificates, or IPs.

How Repositories Are Discovered

AIM detects repositories using:
  • GitLab Adapter — Syncs repos, metadata, and activity logs.
  • CI/CD Integrations — Detects repos referenced in pipelines.
  • VM adapter — Maps vulnerabilities back to their source repos.
This ensures AIM maintains a real-time inventory of your entire code ecosystem.

Example Use Cases

  • Security Teams: Identify vulnerable or abandoned repos.
  • Developers: Track ownership and risk of application code.
  • Compliance Teams: Ensure all repositories meet governance requirements.
  • Engineering Leaders: Monitor development activity trends.

Explore Live Demo

Explore AIM Live — No Signup Needed

Instantly explore how Snapsec AIM discovers, enriches, and tracks every asset in real time — all without creating an account.