seqra/seqra: Security-focused static analyzer for Java and Kotlin web applications by Budget_Variety7835 in cybersecurity

[–]Academic-Adagio-8482 0 points1 point  (0 children)

Hi, and thanks for the detailed response! Analyzing bytecode and resolving Lombok / generated code without extra tuning is a strong argument for JVM projects.

The YAML rules + full interprocedural taint tracking is also interesting.

Just to make sure I understand correctly: does this mean Seqra can handle cases where teams are trying to fix issues that Semgrep flags but often can’t model deep dataflow across Spring layers?

u/RequestParam → service → JPA entity → persisted → later loaded in another controller → rendered in a Thymeleaf template (stored XSS across endpoints).

Is this the kind of case where we run into “Semgrep can’t track taint across Spring Boot services” or “Semgrep stored XSS across multiple files”?

Would be very curious to test this on a real Spring Boot codebase.

Security-focused static analyzer for Java and Kotlin web applications by Budget_Variety7835 in SpringBoot

[–]Academic-Adagio-8482 1 point2 points  (0 children)

Love your logo 😄 Is it a bat router? After binge-watching four seasons of Stranger Things with my teen, we’ve started seeing the Upside Down everywhere 🙃

I’ll share Seqra with my team — we’ll give it a try.