sans25
SANS/CWE Top 25 Dispatcher
Analyze scoped code directly against the SANS/CWE Top 25 Most Dangerous Software Weaknesses (2024). Unlike the OWASP and STRIDE dispatchers, this skill does NOT dispatch individual subagents per category. Instead it reads the full framework reference, determines which CWEs are relevant to the scoped code based on languages and patterns, checks each applicable CWE directly, groups findings by CWE category, and cross-references with OWASP and STRIDE mappings.
Supported Flags
Read ../../shared/schemas/flags.md for the
full flag specification. This dispatcher supports all cross-cutting flags.
| Flag | Dispatcher-Specific Behavior |
|---|---|
--scope |
Determines which files to analyze. Default changed. |
--depth |
Controls analysis thoroughness. Default standard. |
--severity |
Applied after analysis to filter output. |
--format |
Applied to final output. |
--only CWE-89,CWE-79 |
Check only the listed CWEs. Accepts comma-separated CWE identifiers (e.g., CWE-89, CWE-787, CWE-22). Unlisted CWEs are skipped entirely. |
--fix |
Produce fix suggestions inline for each finding. |
--quiet |
Findings only, suppress explanations. |
--explain |
Add learning material per finding. |
Framework Reference
Read ../../shared/frameworks/sans-cwe-top25.md
for the full SANS/CWE Top 25 specification including weakness descriptions,
code-level indicators, severity ratings, and cross-framework mapping tables.
Workflow
Step 1: Resolve Scope
Parse the --scope flag and resolve to a concrete file list. Use Git
commands or Glob as appropriate for the scope type. Record the resolved
file list for use in subsequent steps.
Step 2: Detect Languages and Technology Stack
Scan the scoped files to identify:
- Languages: file extensions (
.c,.cpp,.py,.js,.ts,.java,.go,.rb,.php,.rs, etc.) - Frameworks: imports and config files (Express, Django, Flask, Spring, Rails, ASP.NET, etc.)
- Data layer: database libraries, ORM usage, raw query patterns
- Infrastructure: Dockerfiles, deployment manifests, CI/CD config
This determines which CWEs are applicable. Record a language_profile
summarizing what was detected.
Step 3: Determine Applicable CWEs
Using the language_profile, filter the 25 CWEs to those relevant for this
codebase. Each CWE category has language-specific applicability:
| Category | CWEs | Applicable When |
|---|---|---|
| Memory Safety | CWE-787, CWE-125, CWE-416, CWE-476, CWE-190, CWE-119 | C, C++, Rust (unsafe blocks), or any code with FFI/native bindings |
| Injection | CWE-79, CWE-89, CWE-78, CWE-94, CWE-77 | Any language with user input handling, database queries, shell execution, or template rendering |
| Auth/AuthZ | CWE-862, CWE-863, CWE-306, CWE-287 | Any code with authentication, authorization, session management, or API endpoints |
| Data Handling | CWE-20, CWE-22, CWE-502, CWE-200, CWE-918, CWE-352, CWE-434, CWE-400 | Any code handling user input, files, URLs, serialization, or resource allocation |
| Configuration | CWE-798, CWE-269 | Any code with credentials, privilege management, or deployment config |
If --only is specified, skip the relevance check and analyze only the
listed CWEs.
Memory safety skip rule: If no C, C++, Rust, or native binding code is present, skip the entire Memory Safety category and record the skip reason. Do NOT report memory safety CWEs for pure Python, JavaScript, Java, Go, or Ruby codebases.
Step 4: Analyze Each Applicable CWE
For each applicable CWE, read its section in sans-cwe-top25.md and check
the scoped code against the documented code-level indicators.
For each CWE, perform the following:
-
Pattern scan: Use Grep to search for the code-level indicators listed in the framework reference. For example, for CWE-89 (SQL Injection), search for string concatenation in SQL queries,
f"SELECT, raw query methods, and dynamic table/column names. -
Context analysis: Read the surrounding code for each pattern match. Determine whether the match is a true positive or a false positive. Consider:
- Is user input actually reaching this code path?
- Are there existing mitigations (parameterized queries, input validation, encoding)?
- Is the pattern in test code, comments, or dead code?
-
Severity assessment: Assign severity based on the CWE's documented severity rating, adjusted for context:
- Upgrade if the code is in a critical path (auth, payment, PII handling).
- Downgrade if existing mitigations partially address the weakness.
-
Create finding: For each confirmed weakness, create a finding object following the schema in
shared/schemas/findings.md. Set:id:CWE<NNN>-<SEQ>(e.g.,CWE89-001,CWE787-002)references.cwe: The CWE identifierreferences.sans_cwe25: The rank (1-25)metadata.framework:"sans25"metadata.category: The CWE category group (e.g.,"injection","memory-safety","auth","data-handling","config")
If --depth deep or --depth expert, additionally:
- Trace data flows from user input to the vulnerable code point.
- Follow imports and cross-file calls to confirm reachability.
- Check for defense-in-depth layers that might mitigate the weakness.
Step 5: Group Findings by Category
Organize confirmed findings into the five CWE category groups:
| Group | ID | CWEs Covered |
|---|---|---|
| Memory Safety | memory-safety |
CWE-787, CWE-125, CWE-416, CWE-476, CWE-190, CWE-119 |
| Injection | injection |
CWE-79, CWE-89, CWE-78, CWE-94, CWE-77 |
| Auth/AuthZ | auth |
CWE-862, CWE-863, CWE-306, CWE-287 |
| Data Handling | data-handling |
CWE-20, CWE-22, CWE-502, CWE-200, CWE-918, CWE-352, CWE-434, CWE-400 |
| Configuration | config |
CWE-798, CWE-269 |
Within each group, sort findings by CWE rank (lower rank = more dangerous).
Step 6: Cross-Reference with Other Frameworks
For each finding, populate cross-framework references using the mapping
table in sans-cwe-top25.md:
references.owasp: Map to the OWASP Top 10 category (e.g., CWE-89 maps toA03:2021).references.stride: Map to STRIDE category letters (e.g., CWE-89 maps toT, I, E).references.mitre_attck: Map to ATT&CK technique IDs (e.g., CWE-89 maps toT1190, T1059).
Use the "Cross-Framework Mapping Table" section in the framework reference as the authoritative source for these mappings.
Step 7: Deduplicate
Two findings are duplicates if they share the same location.file AND
location.line (or overlapping line ranges) AND refer to the same or
parent/child CWE. When duplicates exist:
- Keep the finding with the higher-ranked CWE (lower rank number).
- Merge CWE references into the retained finding.
- Note the duplicate in the retained finding's description.
Step 8: Rank and Filter
Sort all findings: critical > high > medium > low. Within the same severity, sort by CWE rank (lower rank first), then by confidence (high > medium > low).
Apply the --severity filter to exclude findings below the threshold.
Step 9: Produce Output
Wrap findings in the aggregate output format from shared/schemas/findings.md:
{
"tool": "sans25",
"scope": "{SCOPE}",
"depth": "{DEPTH}",
"language_profile": ["python", "javascript"],
"categories_checked": ["injection", "auth", "data-handling", "config"],
"categories_skipped": ["memory-safety"],
"skip_reason": "No C/C++/Rust or native bindings detected",
"total_findings": 7,
"by_severity": { "critical": 2, "high": 3, "medium": 1, "low": 1 },
"by_cwe_group": {
"injection": 3,
"auth": 2,
"data-handling": 1,
"config": 1
},
"findings": [ ... ]
}
Step 10: Present Results
Output the report in the requested --format. Include:
- Language profile: detected languages and technologies.
- Coverage table: which CWE groups were checked and which were skipped (with reasons).
- CWE group breakdown: finding count per group.
- Severity breakdown: count by critical/high/medium/low.
- Findings list: in severity order, grouped by CWE category.
- Cross-framework summary: for each finding, show the OWASP, STRIDE, and ATT&CK mappings so the finding can be located in other framework reports.
Expert Mode
If --depth expert is set, after the main analysis:
-
Read
../../shared/frameworks/dread.mdfor DREAD scoring criteria. Assign a DREAD score to each finding. -
Identify CWE chains -- combinations of weaknesses that amplify each other. For example:
- CWE-20 (Improper Input Validation) + CWE-89 (SQL Injection): missing validation enables injection.
- CWE-306 (Missing Authentication) + CWE-862 (Missing Authorization): unauthenticated access to unprotected resources.
- CWE-798 (Hard-coded Credentials) + CWE-287 (Improper Authentication): attacker uses leaked credentials to bypass auth.
-
For each chain, describe the combined attack scenario and assign an aggregate severity reflecting the chained impact.
-
Append chain findings with prefix
CHAINandmetadata.toolset to"cwe-chain".