AquilaX Docs
Service StatusFeature RequestLogin
  • Documentation
  • Products and Services
    • Demo
      • Security Engineer - Assistant
      • Security Engineer - Chat
    • Products
    • Services
      • Vulnerability Triaging
      • AppSec Training
      • DevSecOps Consultation
      • Deployment Options
      • Security Consultation
      • Integrations
    • Company Principles
      • Engineering Principles
      • AI Principles
      • AquilaX Mission
    • Proof of Value (PoV)
    • SLO/SLA/SLI
    • Security Scanners
    • Supported Languages
    • What is AquilaX
    • Success Cases
      • RemoteEngine
    • AquilaX License Model
  • User Manual
    • Access Tokens
    • Scanners
      • Secret Scanning
      • PII Scanner
      • SAST
      • SCA
      • Container Scanning
      • IaC Scanning
      • API Security
      • Malware Scanning
      • AI Generated Code
      • License Scanning
    • DevTools
      • AquilaX CLI
      • CI/CD
        • GitHub Integration
        • GitLab Integration
      • Vulnerability Tickets
        • GitHub Issues
        • GitLab Issues
        • JIRA Tickets
      • IDE
        • VS Code
    • Frameworks
    • Roles
    • Security Policy
    • Comparison
      • ArmorCode vs AquilaX
      • Black Duck vs AquilaX
      • AquilaX vs other Vendors
    • Press and Logo
    • Install AquilaX
    • Public Scan
    • Scanning Setup Guide
    • AI Chat Prompts
  • API Docs
  • Tech Articles
    • Proprietary AI Models
    • AquilaX Securitron
    • Securitron AI Service
    • Secure SDLC (DevSecOps)
    • Bending the technology
    • SecuriTron In Action
    • Future
      • The Future of Code Review
      • Building Superhumans
    • Blog
      • Breaking the Code: AquilaX
      • Rethinking Authentication in 2024
      • Software Supply Chain Security
      • OneFirewall - Network Security
      • The Art of Doing Source Code Review
      • Our Cloud Infrastracture
    • AppSec
      • 10 ‘must’ controls
      • OWASP Top 10
      • MITRE ATT&CK Framework
      • SQL Injection
      • DevSecOps
      • Insider Threats in Application Security
      • Secure API Development
      • RBAC in Applications
      • Security in CI/CD Pipelines
      • Audits in DevSecOps
      • Security Policies
      • S SDLC
      • Multi-Factor Authentication (MFA)
      • API Gateway Security
      • RESTful APIs
      • Microservices
      • Secure API Development
      • API Security Best Practices
    • AI
      • AI part of AppSec
      • NL-JSON Model
      • Findings Review (AquilaX AI)
      • AI-Driven Vulnerability Triage
    • Tech Events
      • Web Summit 2024
    • ASPM
    • State of Art Secure SDLC
      • Validating Runtime Security
    • Announcements
      • 10 Billion
      • AquilaX Joins NVIDIA Inception
    • Webinars
      • Unlock the Future of Code Security with AI
  • AI Models
    • AI Scanner
    • Query
    • QnA
    • Security Assistant
    • Review
Powered by GitBook
On this page

Was this helpful?

  1. Tech Articles
  2. AI

Findings Review (AquilaX AI)

How AquilaX is capable to predict if any finding is False Positive or True Positive

PreviousNL-JSON ModelNextAI-Driven Vulnerability Triage

Last updated 6 months ago

Was this helpful?

Alright, buckle up! Let’s dive into the magical (okay, slightly technical) world of AquilaX, where we make software security look easy—but don’t worry, we know it’s anything but.

So, How Does AquilaX Decide if a Vulnerability is Real or Just a Fluke?

We get it. Security vulnerabilities are complex, and nobody wants false alarms. False positives (a.k.a., the software crying “Wolf!” when there’s none) are annoying. True positives, on the other hand, mean there's something real to fix. AquilaX is here to help you tell the difference, without breaking a sweat.

Now, fair warning: It’s a bit like explaining how a magic trick works—it’s fascinating but technical. So let’s break it down into the steps AquilaX follows to keep things secure and smart.

  1. First Up, We Scan That Code We scan the code, top to bottom, using a bunch of tools—think of it like a mini battalion of scanners with unique specialties (some homegrown, some open source).

  2. Identify & Label Each vulnerability goes into our system as “Unverified.” We’re cautious about labeling, so no rush decisions here!

  3. The Human Touch Next, a developer or security expert jumps in. They review the finding to determine if it’s a True Positive or a False Positive. For our Ultimate Plan users, AquilaX's team even pitches in to handle this part.

  4. Learning Time We take this info and feed it back into our system. The machine learns, adjusts, and starts getting smarter about recognizing patterns. It’s like teaching a puppy which toys to chew on, only the puppy is a highly complex AI model.

  5. Some (Secret) Magic Happens Now, we’d love to tell you every last detail, but some things are top-secret. Let’s just say our AI gets pretty darn smart. It starts spotting the difference between real and false vulnerabilities faster and more accurately.

  6. The AI Is Now on Autopilot With all that training, the next time a potential vulnerability pops up, our AI can confidently say if it’s a False Positive, True Positive, or if it needs a second look.

And that’s the scoop! AquilaX turns the chaos of security scanning into a smooth and dependable process, so you can focus on creating amazing software without getting bogged down by every “maybe” vulnerability.

For more on how it works in action, head to and see the magic for yourself.

AquilaX
AquilaX - Review Model (SecuriTron)