sec1-sast Security Scanner - Quick Start Guide
Automated Security Scanning with Dashboard Integration
Option 1:
**Step 1: Download exe from here
--
**Step 2: Excute below command-
sec1-sast.exe scan --upload-report --upload-api-key <your_api_key> -o report.json <code_repo_path>
--
Option 2:
π Get Started in 3 Steps
Step 1: Install Docker Desktop
Download and install Docker Desktop for Windows:
Download: https://www.docker.com/products/docker-desktop
Install: Run the installer and restart your computer
Verify: Docker Desktop should show "Running" in system tray
Step 2: Download Scanner Configuration
Download these 1 files to a folder (e.g., C:\sec1-scanner):
docker-compose.yml- Scanner configurationRun command (see Step 3)
No installation or compilation needed! The scanner runs as a Docker container.
Step 3: Configure & Run
Open Command Prompt or PowerShell in your scanner folder and run:
Replace these values:
your-api-key-hereβ Your API key (provided by sec1)my-applicationβ Your application name/workspaceβ Path to your code (configured in next section)
βοΈ Configuration
Mount Your Code
Edit docker-compose.yml and change the CODE_PATH:
Important: Use forward slashes (/) not backslashes (\)
Examples:
Save Reports Locally (Optional)
Add a volume for reports:
Reports will be saved to C:/Users/YourName/reports/sast-report.json
π§ Troubleshooting
"Cannot connect to Docker daemon"
Start Docker Desktop
Wait for "Docker Desktop is running" message
Check system tray for Docker whale icon
"Cannot find /workspace"
Check
CODE_PATHindocker-compose.ymlUse forward slashes:
C:/path/to/codeEnsure path exists: verify in File Explorer
Enable file sharing in Docker Desktop:
Settings β Resources β File Sharing
Add your drive (e.g., C:)
"Upload failed"
Verify API key is correct
Check dashboard URL is accessible
Test connection:
ping api.sec1.ioCheck firewall/antivirus settings
"Permission denied"
Run Command Prompt as Administrator
Check folder permissions in Windows
Ensure Docker Desktop has admin rights
π Pre-Flight Checklist
Before your first scan:
π Security & Privacy
Your Code Stays Safe:
β Code never leaves your machine
β Mounted read-only (scanner cannot modify files)
β Runs in isolated Docker container
β Only vulnerability metadata uploaded to dashboard
What's Uploaded to Dashboard:
Vulnerability type and severity
File path and line number (relative paths)
Code snippet (2-3 lines context only)
CWE ID and description
Remediation suggestions
What's NOT Uploaded:
Full source code
Environment variables
Configuration files (unless they contain vulnerabilities)
Business logic or proprietary code
Last updated