Skip to main content

Clayton Rules - Common Weakness Enumeration mapping

David Martin avatar
Written by David Martin
Updated over 3 weeks ago

For every relevant violation detected, Clayton, maps the identified problems with the related software security weakness definition specified by the CWE community (https://cwe.mitre.org/index.html).
​

The CWE official resources and IDs are accessible directly in-app with every code review and present in all the reports. You can read more here.

Did this answer your question?