Skip to content
| Marketplace
Sign in
Visual Studio Code>Other>Yagaan SASTNew to Visual Studio Code? Get it now.
Yagaan SAST

Yagaan SAST

Yagaan

|
1 install
| (0) | Free
VSCode Extension to investigate and fix security issues in code
Installation
Launch VS Code Quick Open (Ctrl+P), paste the following command, and press enter.
Copied to clipboard
More Info

Yagaan SAST

Overview

Yagaan SAST for VS Code retrieves and explains the results of a Yagaan (Pradeo) source code security scan, helping you quickly identify and fix vulnerabilities. This extension connects to a Pradeo Scan Server to display detected security vulnerabilities as warnings directly in your IDE.

You therefore need an account on a Pradeo Scan Server, either on-premise or as a service at https://scan.yagaan.io You'll then attach your workspace to a previously scanned project (using CI pipeline for example) in order to retrieve and synchronize detected issues with your workspace.

See https://www.pradeo.com

Quickstart

Setting up Connection and Authentication

First, configure your connection to the Scan Server in VS Code settings. We recommend using a Personal Access Token for authentication. You can generate one from your Scan Server account page

Attaching to a Project

Once authenticated, you can link your current workspace to a scanned project:

  1. Run Attach to Project Command: Open the command palette and run Yagaan: Attach to Project.
  1. Select Credentials Method: As you haven't been authenticated yet, you'll be prompted to enter your credentials (token or username/password).
  2. Choose a Project: Choose the corresponding project from the list available on your Scan Server.

After linking, detected vulnerabilities will appear in your workspace for review.

Requirements

You need a Pradeo Scan Server, either on-premise or SaaS. See https://www.pradeo.com.

Features

AI vulnerability explanation and chat

If a code-mining server is configured in the Yagaan plugin settings, you can access AI-generated explanations for vulnerabilities.

Explanations are produced by the code-mining server and a self-hostable LLM, ensuring full privacy of your code.

The deep knowledge of the code analysis provided by the code-mining enables the generation of contextual and high-quality explanations, even when using self-hosted LLM models.

The explanation of each selected vulnerability will be displayed in the Explanation of the vulnerability view.

You can also do ai-chat with the explanation in order to clarify some points about the vulenrability or to give some additional context or insight.

If you've configured a code-mining server within the Yagaan plugin settings, you can access AI-powered explanations for your code. These explanations are generated by the code-mining server and a locally hosted language model, ensuring your code remains private.

You can also engage in a conversational chat about the explanation to gain further clarity, additional context, or deeper insights into the vulnerability.

💡 AI and code-ming features are optional and require a configured code-mining server.

Vulnerabilies explanation and resolution

Extension help developers to understand the security issues found within their code. Each identified vulnerability is accompanied by an interactive diagnostic, detailing the nature of the issue, its causes, and its potential exploitation flow.

In addition to understanding the vulnerabilities, the extension provides actionable remediation guidance and some examples (if any) extracted from the scanned project itself.

Risk assessment

The Risk Assessment feature focuses on prioritization by evaluating each identified vulnerability based on factors such as severity, exploitability, and potential impact on your application and its users. This assessment assigns a CVSS score to each vulnerability, allowing developers to quickly identify which issues require immediate attention and which can be scheduled for future fixes.

Action plan

The Risk Assessment view lets you create a straightforward action plan that all developers with access to the project's scan can share.

By having a clear list of prioritized vulnerabilities to work on, the team can focus their efforts together on the most critical risks, making it easier to boost the project's security while working as a team.

Status of a vulnerability

Each vulnerability has a status which is obtained from its potential action plan and of the current workspace state:

  • Todo: default status of any issue
  • Deprecated: an issue which is not consistent with your workspace state (changed or deleted code).
  • In progress: someone in the dev team is working on of the issue.
  • Done: issue has been fixed.
  • Ignored: won't fix the issue.

You can use those status to filter the risk assessment view:

  • Planned: show issues that have been planned to an action plan.
  • Closed: show issues that have a status Done or Ignored.
  • Deprecated: show issues that can't be mapped to source code in your workspace state.

Create an action plan

Before creating an action plan, ensure you've already attached your workspace to a project on the Pradeo Scan Server.

To create an action plan:

  1. Open the Risk Assessment view to see all detected vulnerabilities. ou can filter the view by status (e.g., "Planned", "Closed", "Deprecated") to focus on relevant issues.
  2. Select one or more vulnerabilities:
    • Click once to select one
    • Shift + Click to select multiple
  3. Right-click the selection and choose “Create Action Plan”.
  4. Enter a name for the plan when prompted.

The plan will appear in a dedicated view and be shared automatically with team members who have project access.

Release Notes

2.0.0

  • AI Explanation & Chat: Add AI-powered explanations and chat, through a code-mining server, for detected vulnerabilities.

  • Configurable Logging: Support for configurable logging in the Yagaan SAST VSCode output.

1.0.0

Initial release of the extension

FAQ

Q: What if I don't have a code-mining server?

A: You can still use the plugin to view vulnerability diagnostics and remediation guidance. AI explanations are optional and require a code-mining server.

  • Contact us
  • Jobs
  • Privacy
  • Manage cookies
  • Terms of use
  • Trademarks
© 2025 Microsoft