{
  "$schema": "http://json-schema.org/draft-07/schema#",
  "global": [
    {
      "field": "SECURE_ANALYZERS_PREFIX",
      "label": "Image prefix",
      "type": "string",
      "default_value": "",
      "value": "",
      "size": "LARGE",
      "description": "Analyzer image's registry prefix (or name of the registry providing the analyzers' image)"
    },
    {
      "field": "SAST_EXCLUDED_PATHS",
      "label": "Excluded Paths",
      "type": "string",
      "default_value": "",
      "value": "",
      "size": "MEDIUM",
      "description": "Comma-separated list of paths to be excluded from analyzer output. Patterns can be globs, file paths, or folder paths."
    }
  ],
  "pipeline": [
    {
      "field": "stage",
      "label": "Stage",
      "type": "string",
      "default_value": "",
      "value": "",
      "size": "MEDIUM",
      "description": "Pipeline stage in which the scan jobs run"
    },
    {
      "field": "SEARCH_MAX_DEPTH",
      "label": "Search Maximum Depth",
      "type": "string",
      "default_value": "",
      "value": "",
      "size": "SMALL",
      "description": "Specifies the number of directory levels to be included in the repository search phase during SAST analysis. SAST scanner searches through the repository to detect the programming languages used and selects the corresponding analyzers. After that, the entire repository is analyzed."
    }
  ],
  "analyzers": [
    {
      "name": "brakeman",
      "label": "Brakeman",
      "enabled": true,
      "description": "Ruby on Rails",
      "variables": [
        {
          "field": "SAST_BRAKEMAN_LEVEL",
          "label": "Brakeman confidence level",
          "type": "string",
          "default_value": "1",
          "value": "",
          "size": "SMALL",
          "description": "Ignore Brakeman vulnerabilities under given confidence level. Integer, 1=Low, 2=Medium, 3=High."
        }
      ]
    },
    {
      "name": "flawfinder",
      "label": "Flawfinder",
      "enabled": true,
      "description": "C, C++",
      "variables": [
        {
          "field": "SAST_FLAWFINDER_LEVEL",
          "label": "Flawfinder risk level",
          "type": "string",
          "default_value": "1",
          "value": "",
          "size": "SMALL",
          "description": "Ignore Flawfinder vulnerabilities under given risk level. Integer, 0=No risk, 5=High risk."
        }
      ]
    },
    {
      "name": "kubesec",
      "label": "Kubesec",
      "enabled": true,
      "description": "Kubernetes manifests, Helm Charts",
      "variables": [

      ]
    },
    {
      "name": "nodejs-scan",
      "label": "Node.js Scan",
      "enabled": true,
      "description": "Node.js",
      "variables": [

      ]
    },
    {
      "name": "phpcs-security-audit",
      "label": "PHP Security Audit",
      "enabled": true,
      "description": "PHP",
      "variables": [

      ]
    },
    {
      "name": "pmd-apex",
      "label": "PMD APEX",
      "enabled": true,
      "description": "Apex (Salesforce)",
      "variables": [

      ]
    },
    {
      "name": "security-code-scan",
      "label": "Security Code Scan",
      "enabled": true,
      "description": ".NET Core, .NET Framework",
      "variables": [

      ]
    },
    {
      "name": "semgrep",
      "label": "Semgrep",
      "enabled": true,
      "description": "Multi-language scanning",
      "variables": [

      ]
    },
    {
      "name": "sobelow",
      "label": "Sobelow",
      "enabled": true,
      "description": "Elixir (Phoenix)",
      "variables": [

      ]
    },
    {
      "name": "spotbugs",
      "label": "Spotbugs",
      "enabled": true,
      "description": "Groovy, Java, Scala",
      "variables": [

      ]
    }
  ]
}
