Skip to main content

Common Weakness Enumeration mapping

David Martin avatar
Written by David Martin
Updated this week

For every relevant violation detected, Clayton, maps the identified problems with the related software security weakness definition specified by the CWE community (https://cwe.mitre.org/index.html).
​

The CWE official resources and IDs are accessible directly in-app with every code review and present in all the reports. You can read more here.

Did this answer your question?