Skip to content

Commit b5e025b

Browse files
Add malicious PR protection preview to Code Security documentation (#32043)
* update security pages and add malicious PR page * comment out eng blog hyperlink for now, to be added back in after release * add comment for future reference * Update content/en/security/_index.md Co-authored-by: Michael Cretzman <[email protected]> * Update content/en/security/code_security/static_analysis/malicious_pr_protection.md Co-authored-by: Michael Cretzman <[email protected]> * Update content/en/security/code_security/static_analysis/malicious_pr_protection.md Co-authored-by: Michael Cretzman <[email protected]> * Update malicious_pr_protection.md * Update content/en/security/code_security/static_analysis/malicious_pr_protection.md Co-authored-by: Michael Cretzman <[email protected]> * fixing broken image --------- Co-authored-by: Michael Cretzman <[email protected]> Co-authored-by: Michael Cretzman <[email protected]>
1 parent ebb87f8 commit b5e025b

File tree

7 files changed

+69
-10
lines changed

7 files changed

+69
-10
lines changed

config/_default/menus/main.en.yaml

Lines changed: 7 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -6742,7 +6742,7 @@ menu:
67426742
identifier: sec_static_analysis_generic_ci_providers
67436743
url: /security/code_security/static_analysis/generic_ci_providers/
67446744
parent: sec_static_analysis
6745-
weight: 4
6745+
weight: 3
67466746
- name: Static Code Analysis (SAST) rules
67476747
identifier: sec_static_analysis_rules
67486748
url: /security/code_security/static_analysis/static_analysis_rules/
@@ -6753,7 +6753,7 @@ menu:
67536753
url: /security/code_security/static_analysis/custom_rules/
67546754
parent: sec_static_analysis
67556755
weight: 5
6756-
- name: SAST Custom Rules Tutorial
6756+
- name: SAST Custom Rule Creation Tutorial
67576757
identifier: sec_static_analysis_custom_rules_tutorial
67586758
url: /security/code_security/static_analysis/custom_rules/tutorial/
67596759
parent: sec_static_analysis
@@ -6763,6 +6763,11 @@ menu:
67636763
url: /security/code_security/static_analysis/custom_rules/guide/
67646764
parent: sec_static_analysis
67656765
weight: 5
6766+
- name: Malicious PR Protection
6767+
identifier: sec_static_analysis_malicious_pr_protection
6768+
url: /security/code_security/static_analysis/malicious_pr_protection
6769+
parent: sec_static_analysis
6770+
weight: 4
67666771
- name: Software Composition Analysis (SCA)
67676772
identifier: software_composition_analysis
67686773
url: /security/code_security/software_composition_analysis/

content/en/security/_index.md

Lines changed: 4 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -112,10 +112,12 @@ To learn more, check out the [30-second Product Guided Tour][14].
112112
- [Runtime Code Analysis (IAST)][29] for identifying vulnerabilities in the first-party code within your services
113113
- [Secret Scanning][30] for identifying and validating leaked secrets (in Preview)
114114

115-
Code Security helps teams implement DevSecOps throughout the organization:
115+
With IDE integrations, pull request comments, and CI/CD gates, Code Security helps teams implement DevSecOps throughout the organization:
116116
- **Developers:** early vulnerability detection, code quality improvements, faster development as developers spend less time debugging and patching.
117117
- **Security Administrators:** enhanced security posture, improved patch management in response to early vulnerability alerts, and compliance monitoring.
118-
- **Site Reliability Engineers (SREs):** automated security checks throughout CI/CD workflow, security compliance, and system resilience. SAST reduces manual overhead for SREs and ensures that each release is thoroughly tested for vulnerabilities.
118+
- **Site Reliability Engineers (SREs):** automated security checks throughout CI/CD workflow, security compliance, and system resilience. SAST reduces manual overhead for SREs and ensures that each release is thoroughly tested for vulnerabilities.
119+
120+
{{< img src="code_security/gitlab_integration_light.png" alt="A SAST finding within a GitLab repository" width="100%">}}
119121

120122
## Cloud Security
121123

@@ -131,11 +133,6 @@ To get started with Datadog Security, navigate to the [**Security** > **Setup**]
131133

132134
Datadog [App and API Protection (AAP)][1] provides observability into application-level attacks that aim to exploit code-level vulnerabilities, such as Server-Side-Request-Forgery (SSRF), SQL injection, Log4Shell, and Reflected Cross-Site-Scripting (XSS). AAP leverages [Datadog APM][2], the [Datadog Agent][3], and in-app detection rules to detect threats in your application environment. Check out the product [Guided Tour](https://www.datadoghq.com/guided-tour/security/application-security-management/) to see more.
133135

134-
In addition to threat detection, Datadog provides end-to-end code and library vulnerability detection from development to production with [Code Security][20], which includes the following capabilities:
135-
- [Static Code Analysis (SAST)][21] for identifying security and quality issues in your first-party code
136-
- [Software Composition Analysis (SCA)][22] for identifying open source dependencies in both your repositories and your services
137-
- [Runtime Code Analysis (IAST)][23] for code-level vulnerabilities in your services
138-
139136
{{< img src="/security/application_security/app-sec-landing-page.png" alt="A security signal panel in Datadog, which displays attack flows and flame graphs" width="75%">}}
140137

141138
## Workload Protection

content/en/security/code_security/_index.md

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -32,6 +32,8 @@ Static Code Analysis (SAST) analyzes pre-production code to identify security an
3232
Scans can run via your CI/CD pipelines or directly in Datadog with hosted scanning.
3333
See [Static Code Analysis Setup][6] to get started.
3434

35+
Static Code Analysis can also scan your pull requests at scale to detect and prevent malicious code changes. This allows Datadog to not only check for known code vulnerabilities, but also detect potentially malicious intent in PRs submitted to default branches of your repositories. [Request access to the Preview][12].
36+
3537
## Software Composition Analysis
3638
Software Composition Analysis (SCA) analyzes open source libraries in both your repositories and running services. You can track and manage dependencies across the software development lifecycle with:
3739
- IDE integration to flag vulnerabilities affecting libraries running on your services
@@ -72,3 +74,4 @@ Developers are being actively targeted with supply chain attacks. Prevent malici
7274
[9]: https://www.datadoghq.com/product-preview/secret-scanning/
7375
[10]: /security/code_security/iac_security
7476
[11]: https://docs.google.com/forms/d/1Xqh5h1n3-jC7au2t30fdTq732dkTJqt_cb7C7T-AkPc
77+
[12]: https://www.datadoghq.com/product-preview/malicious-pr-protection/

content/en/security/code_security/static_analysis/custom_rules/tutorial.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
---
22
description: Learn how to define a custom rule within Datadog.
3-
title: Static Code Analysis Custom Rule Tutorial
3+
title: Static Code Analysis Custom Rule Creation Tutorial
44
---
55

66

Lines changed: 54 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,54 @@
1+
---
2+
title: Malicious PR Protection
3+
description: Learn about how Datadog Static Code Analysis can scan your PRs at scale to prevent malicious code changes.
4+
is_beta: false
5+
algolia:
6+
tags: ['static analysis', 'datadog static analysis', 'code quality', 'SAST']
7+
---
8+
9+
{{% site-region region="gov" %}}
10+
<div class="alert alert-danger">
11+
Code Security is not available for the {{< region-param key="dd_site_name" >}} site.
12+
</div>
13+
{{% /site-region %}}
14+
15+
16+
Datadog Static Code Analysis (SAST) Malicious PR protection uses LLMs to detect and prevent malicious code changes at scale. This functionality scans code for known vulnerabilities and detects potentially malicious intent in the pull requests (PRs) submitted to your repositories. Malicious PR protection helps you to:
17+
18+
- Scale your code reviews as the volume of AI-assisted code changes increases
19+
- Secure code changes from both internal and external contributors
20+
- Embed code security into your security incident response workflows
21+
22+
Malicious PR protection is supported for default branches and GitHub repositories only.
23+
24+
{{< callout url="https://www.datadoghq.com/product-preview/malicious-pr-protection/" >}}
25+
Malicious PR protection is in Preview. Click <strong>Request Access</strong> and complete the form to request access.
26+
{{< /callout >}}
27+
28+
## Detection coverage
29+
30+
Malicious code changes come in many different forms. Datadog SAST covers attack vectors such as:
31+
32+
- Malicious code injection
33+
- Attempted secret exfiltration
34+
- Pushing of malicious packages
35+
- CI workflow compromise
36+
37+
Examples include the [tj-actions/changed-files breach (March 2025)][2] and [obfuscation of malicious code in npm packages (September 2025)][3].
38+
39+
<!-- Read more in the blog post [here][1]. -->
40+
<!-- ^^ This line above should be added back in once the eng blog is published -->
41+
42+
## Search and filter results
43+
44+
Detections from Datadog SAST on potentially malicious PRs can be found in [Security Signals][4] by filtering for `malicious_PR`.
45+
46+
There are two potential verdicts: `malicious` and `benign`.
47+
48+
Signals can be triaged directly in Datadog (assign, create a case, or declare an incident), or routed externally via [Datadog Workflow Automation][5].
49+
50+
[1]: https://www.datadoghq.com/blog/engineering/malicious-pull-requests/
51+
[2]: https://www.cisa.gov/news-events/alerts/2025/03/18/supply-chain-compromise-third-party-tj-actionschanged-files-cve-2025-30066-and-reviewdogaction
52+
[3]: https://www.cisa.gov/news-events/alerts/2025/09/23/widespread-supply-chain-compromise-impacting-npm-ecosystem
53+
[4]: https://app.datadoghq.com/security
54+
[5]: /actions/workflows/
1.67 MB
Loading
1.33 MB
Loading

0 commit comments

Comments
 (0)