Learn how to implement and use project filters to search, prioritize, and manage projects across your organization.
Filters enable targeted queries based on attributes such as severity, package ecosystems, dependency resolution, and platform source.
This guide explains how filters work, how to apply and combine them effectively, and provides practical examples to support triage, audit, and reporting workflows across large codebases.
Access project filters
Perform the following steps to apply filters to the project list.
Select Projects from the left sidebar.
Click Add Filter.
Select from the list of available filters.
Enter appropriate values and click Add Filter.
You can combine multiple filters to create more specific searches and narrow down the project list based on multiple criteria.
How filters work
Each filter consists of three parts.
Field: The attribute to be filtered (for example, Package Count, Platform Source).
Operator: The comparison logic (for example, equals, greater than, in).
Value: The target value to evaluate (for example, ECOSYSTEM_NPM, 100).
Project filters use standard comparison operators to evaluate criteria. See Filter operators for detailed information about available operators and their usage.
When you apply multiple filters, the system combines them using logical AND operations across filters for different fields and logical OR operations across filters for the same field.
For example:
Filter 1: Package Count greater than 1
Filter 2: Dependency Resolution Status greater than or equal to 0.5
Filter 3: Package Ecosystems equals ECOSYSTEM_NPM
Filter 4: Package Ecosystems equals ECOSYSTEM_GO
Filter 5: Platform Source in PLATFORM_SOURCE_GITHUB
This combination returns only projects that have more than one package, have a dependency resolution status of at least 50%, use npm or Go packages, and that are from GitHub.
Filter implementation techniques
The following examples demonstrate how to apply filters effectively for common project scenarios.
Filter projects by custom tags
Use custom tags to filter projects based on environment or predefined labels assigned during project initialization or scan configuration.
For example, to view only projects related to Hugging Face models, use the Custom Tags matches huggingface filter.
Filter projects by findings severity
Prioritize remediation efforts by filtering projects based on the number and severity of security findings. You can filter by Critical Priority Findings Count, High Priority Findings Count, Medium Priority Findings Count, Low Priority Findings Count, or Total Findings Count to target different priority levels.
For example, to identify critical priority projects requiring immediate attention, use the Critical Findings Count greater than or equal to 100 filter.
Filter projects by package ecosystem
Use package ecosystem filters to segment projects by programming language or package management system for targeted security policies such as stricter vulnerability thresholds for JavaScript projects or specific license compliance checks for Java applications.
For example, to focus on PHP projects for a security assessment, use the Package Ecosystems equals ECOSYSTEM_PACKAGIST filter.
Filter projects by source platform
Use platform source filters to segment projects by their source platform and correlate findings with platform-native security tools like GitHub’s Dependabot alerts or GitLab’s vulnerability scanning.
For example, to identify projects analyzed from binary artifacts like container images or compiled binaries, use the Platform Source equals PLATFORM_SOURCE_BINARY filter.
Filter projects by dependency resolution quality
Use dependency resolution status to identify projects with resolution issues that impact security analysis accuracy.
For example, to find projects with poor dependency resolution that need investigation, use the Dependency Resolution Status equals 0.5 filter.
Note
Only float values are supported for dependency resolution status filters such as 0.5 for 50%, 0.75 for 75%, or 1.0 for 100%.
Filter projects by scan timestamp
Use last scanned filters to identify projects with stale security data that require fresh scans for current security posture.
For example, to identify projects scanned within the last 24 hours, use the Last Scanned greater than now (-24h) filter.
Filter projects by complexity
Identify projects based on their size and complexity, which may require different levels of security attention and resources.
For example, to focus on large projects with extensive dependency trees, use the Package Count greater than or equal to 10 filter.
Filter projects by reachability analysis status
Use reachability analysis status to identify projects based on the success rate of call graph generation and reachability analysis.
For example, to find projects with successful reachability analysis, use the Reachability Analysis Status greater than or equal to 0.7 filter.
Note
Only float values are supported for reachability analysis status filters such as 0.5 for 50%, 0.75 for 75%, or 1.0 for 100%.
Filter projects by triage status
Review projects based on how findings have been handled by security teams to ensure proper triage and exception handling.
For example, to review projects with dismissed findings, use the Dismissed Findings Count equals 1 filter.
Do not use! Draft content. Development in progress.
Filters enable targeted queries based on attributes such as severity, package ecosystems, dependency resolution, and platform source.
This guide explains how filters work, how to apply and combine them effectively, and provides practical examples to support triage, audit, and reporting workflows across large codebases.
Access project filters
Perform the following steps to apply filters to the project list.
Select Projects from the left sidebar.
Filter your projects using the list of available filters in the filter bar.
Toggle the Advanced option in the filter bar to apply API-style filters.
You can combine multiple filters to create more specific searches and narrow down the project list based on multiple criteria.
How filters work
Each filter consists of three parts.
Field: The attribute to be filtered (for example, Package Count and Platform Source).
Operator: The comparison logic (for example, equals, greater than, and in).
Value: The target value to evaluate (for example, npm and 100).
Project filters use standard comparison operators to evaluate criteria. See Filter operators for detailed information about available operators and their usage.
When you apply multiple filters, the system combines them using logical AND operations across filters for different fields and logical OR operations across filters for the same field.
For example:
Filter 1: Package Ecosystems contains: npm
Filter 2: Platform Source in: GitHub
Filter 3: Package Count: greater than 1
Filter 4: Reachability Analysis Status greater than or equal to: 90%
This combination returns only projects that use npm packages, are from GitHub, have more than one package, and have a reachability analysis status of at least 90%.
Filter implementation techniques
You can use the following filter types to manage your projects effectively.
Preset filters: Use predefined UI-based filters to quickly segment projects by common attributes.
The following examples demonstrate how to apply preset filters for common project scenarios.
Filter projects by custom tags
Use custom tags to filter projects based on environment or predefined labels assigned during project initialization or scan configuration.
For example, to view only projects related to SAST, use the Custom Tags contains: sast filter.
Filter projects by findings severity
Prioritize remediation efforts by filtering projects based on the severity of security findings. You can select from Critical (C), High (H), Medium (M), or Low (L) severity filters to target different priority levels.
For example, to identify projects with critical findings, select the C filter.
Filter projects by package ecosystem
Use package ecosystem filters to segment projects by programming language or package management system for targeted security policies such as stricter vulnerability thresholds for JavaScript projects or specific license compliance checks for Java applications.
For example, to focus on PHP projects for a security assessment, use the Package Ecosystems contains: Packagist filter.
Filter projects by source platform
Use platform source filters to segment projects by their source platform and correlate findings with platform-native security tools like GitHub’s Dependabot alerts or GitLab’s vulnerability scanning.
For example, to identify projects analyzed from GitLab, use the Platform Source in: GitLab filter.
Filter projects by dependency resolution quality
Use dependency resolution status to identify projects with resolution issues that impact security analysis accuracy. You can filter by a single value or a range of percentages.
For example, to identify projects with poor dependency resolution, use the Range filter to find projects with Dependency Resolution Status greater than 0% and less than 50%.
Filter projects by scan timestamp
Use last scanned filters to identify projects with stale security data that require fresh scans for current security posture. You can select from predefined time ranges or use the calendar to select a specific date.
For example, to identify projects scanned within the last 24 hours, use the Last Scanned: Last Day filter.
Filter projects by complexity
Identify projects based on their size and complexity, which may require different levels of security attention and resources.
For example, to focus on large projects with extensive dependency trees, use the Package Count: greater than 100 filter.
Filter projects by reachability analysis status
Use reachability analysis status to identify projects based on the success rate of call graph generation and reachability analysis. You can filter by a single value or a range of percentages.
For example, to identify projects with successful reachability analysis, use the Reachability Analysis Status greater than or equal to: 90% filter.
Filter projects using API
For complex queries, use the advanced filter syntax to combine multiple attributes and apply logical operators.
The following table lists the available attributes for project filters.
|
|
API filter use cases
The following examples demonstrate how to combine these attributes for common security and compliance workflows.
Identify high-risk GitHub projects
Find GitHub projects with more than 5 critical findings and a reachability analysis status below 80%.
spec.platform_source =="PLATFORM_SOURCE_GITHUB" and spec.finding_counts.critical > 5 and spec.package_coverage.call_graph_success_rate < 0.8
Audit stale projects with risks
Identify projects not scanned in the last 7 days that still have outdated dependencies.
spec.last_scanned < now(-168h) and spec.dependency_counts.outdated > 0
Identify projects with low dependency resolution quality
Find projects where dependency resolution is below 90%, which may indicate incomplete security analysis.
spec.package_coverage.success_rate < 0.9
Find large projects with high vulnerability density
Identify projects with more than 100 total packages that also have a high number of critical vulnerabilities.
spec.package_coverage.total > 100 and spec.vulnerability_counts.total.critical > 20
Audit projects with high triaged findings
Find projects where more than 50 findings have been dismissed, useful for auditing triage quality.
spec.finding_counts.dismissed > 50
Triage critical vulnerabilities by ecosystem
Focus on npm projects with a high number of critical vulnerabilities.
spec.package_coverage.ecosystems contains ECOSYSTEM_NPM and spec.vulnerability_counts.total.critical > 10