Using Directed Remediation for Sentinel Source

Sentinel Source is used to analyze source code for security vulnerabilities. You have the ability to download a patch and associated library to remediate a given vulnerability.

Continuous Dynamic Portal Administrators must have enabled Directed Remediation to use this function, see Enabling Directed Remediation for additional information.

To view and identify vulnerabilities with direct remediation available, perform the following steps:

  1. From the main Portal menu, click Findings.

    remediating direct vuln findings 1
  2. Click on the Filter icon.

  3. Click on the drop-down menu for Directed Remediation Patch Available.

    remediating direct vuln findings 2
  4. From the options available, select Available.

    remediating direct vuln findings 3
  5. Click Filter to filter the Findings table.

  6. From the table of findings displayed, click the Wrench/Spanner icon beside the desired finding. This displays the Vulnerability Detail page.

    remediating direct vuln findings 4
  7. Select the Directed Remediation tab at the bottom of the Vulnerability Detail page.

    remediating direct vuln findings 5
  8. Choose which of the Suggested Changes that you want to download.

  9. Click Download Patch to begin the download.

  10. Click on Download Dependencies. This is required to use the patch successfully, since the patch depends on a Black Duck library.

Alternatively, if you understand what is needed from reading the patch, you can correct your code directly and reference the libraries that you already have installed. See Using Directed Remediation - Libraries for additional information on downloading the library and incorporating it in your project.

To apply a patch that you have selected from WhiteHat’s Directed Remediation, see Using Directed Remediation - Patches for more information.