Snyk Code - March Update
Starting March 30, 2026, we’ve updated Snyk Code to provide more accurate results and reduce developer friction. These improvements help you focus on exploitable production code by reducing false positives and automatically deprioritizing issues found in test environments.
By refining our detection logic across several languages, we've lowered noise and increased the catch rate for critical vulnerabilities.
Improvements to scanning precision
We've focused on three key areas to improve your triage experience:
Reduced noise: We've significantly lowered the number of false positives for .NET CSRF and JVM-based certificate validation.
Risk-based triage: JavaScript vulnerabilities located in test classes now appear as Low severity. This change allows you to spend more time on production code rather than test mocks.
Higher confidence: We've increased the true positive catch rate for hardcoded passwords in PHP and CSRF vulnerabilities in Kotlin.
Language-specific updates
You can see these improvements reflected in the following areas:
.NET (C#): Enhanced CSRF detection with an 18% reduction in false positives.
JavaScript: Automated detection of test classes to reclassify issues as Low severity.
Kotlin: Improved support for detecting disabled CSRF protection in Spring Apps and refined SQLi precision.
JVM (Java, Groovy, Kotlin, Scala): Improved logic for CWE-295 (Improper Certificate Validation).
PHP: Expanded patterns for hardcoded password detection.
Important details to note
All percentage improvements are based on Snyk’s curated open-source data set. As part of these updates, you may see a decrease in High and Medium severity counts for JavaScript as issues move to Low based on their file location. These changes apply specifically to the languages and CWEs listed above, while other scan areas remain unchanged.
Sebastian Roth | Senior Product Manager