Skip to main content

Documentation Index

Fetch the complete documentation index at: https://docs.snapsec.co/llms.txt

Use this file to discover all available pages before exploring further.

Overview

Vulnerability Sources represent where your findings originate from — scanners, manual testing, integrations, or external tools. This module helps you:
  • Measure scanner accuracy
  • Identify noisy sources
  • Improve trust in findings
  • Optimize your security pipeline

Source Overview Dashboard

The overview provides:
  • Total Sources → Number of integrated tools
  • Active Sources → Currently contributing findings
  • Total Findings → Aggregated vulnerabilities
  • Accuracy Rate → Valid vs false positives
  • Noisy Sources → High false-positive sources
  • High Confidence Sources → Trusted tools

Source Analytics

Insights Provided

  • Findings by source (valid vs unknown/noisy)
  • Accuracy classification (Valid / FP / Risk Accepted)
  • Monthly source activity trends
This helps you quickly answer:
  • Which tool is most reliable?
  • Where are false positives coming from?
  • How accuracy changes over time

Adding a Source

Use Add Source to onboard a new scanner or detection system.

Required Fields

  • Source Name (e.g., Burp Suite, Nuclei, Manual Testing)

Configuration Options

  • Type
    • Scanner
    • Manual
    • Integration
  • Confidence Level
    • Low / Medium / High
  • Description Context about the tool or methodology

Sources List

The Sources List provides:
  • Source name and type
  • Projects associated
  • Total findings
  • Valid vs False Positives
  • Accuracy percentage
  • Confidence level

Actions

  • Filter and search sources
  • Track performance per source
  • Identify underperforming tools

Signal Analytics

Signal Analytics focuses on data quality.

Key Metrics

  • Accuracy (%) Valid findings ratio
  • False Positive Rate Noise level per source
  • Signal Strength Overall reliability (Low / Moderate / High)

Confidence Distribution

This section shows how your findings are distributed across:
  • High confidence sources
  • Medium confidence sources
  • Low confidence sources

Why It Matters

Most tools dump vulnerabilities — this system evaluates which tools you should trust.

Key Benefits

  • Reduce false positives at scale
  • Prioritize high-confidence findings
  • Benchmark scanner performance
  • Improve remediation efficiency
  • Build trust in your security program

Real-World Use Cases

  • Compare Burp vs automated scanners accuracy
  • Identify noisy integrations (e.g., CI scanners)
  • Track manual testing effectiveness
  • Optimize security tooling ROI

Explore Live Demo

Explore VM Live — No Signup Needed

Track scanner accuracy, reduce noise, and prioritize trusted findings.