Overview
The/analyze command performs LLM-based analysis of existing SARIF findings from previous security scans. It provides deep adversarial thinking, exploitability assessment, and detailed vulnerability explanations.
Syntax
Parameters
Absolute path to the code repository
Path to SARIF file containing scan findings
Maximum number of findings to analyze (default: unlimited)
What It Does
- Loads existing SARIF findings from previous scans
- Analyzes each vulnerability with LLM
- Applies adversarial thinking and attack surface mapping
- Assesses exploitability and impact
- Identifies root causes and attack vectors
- Generates detailed analysis reports
When to Use
Use /analyze When:
- You already have SARIF files from previous scans
- Want to re-analyze findings without re-scanning
- Need deeper insight into specific vulnerabilities
- Combining scanner output from multiple tools
- Performing iterative analysis
Use /agentic When:
- Starting from scratch (no existing findings)
- Want end-to-end workflow
- Need both scanning and analysis
Examples
Analyze Existing Scan Results
Analyze Specific Findings
Combine Multiple Scanners
Analysis Capabilities
Adversarial Thinking
The LLM applies offensive security mindset:- Attack surface identification
- Exploitation path discovery
- Bypass technique analysis
- Chaining vulnerability assessment
Exploitability Assessment
Evaluates practical exploitability:- Exploitable: Clear path to code execution
- Likely exploitable: High confidence with some constraints
- Difficult: Primitives exist but hard to chain
- Unlikely: Blocked by mitigations
- Ruled out: False positive or unexploitable
Root Cause Analysis
Identifies underlying issues:- Input validation failures
- Trust boundary violations
- Unsafe API usage
- Logic flaws
- Design weaknesses
Output Structure
Analysis Report Format
Use Cases
- Re-analyzing findings without re-scanning
- Getting second opinion on scanner results
- Prioritizing vulnerability remediation
- Understanding complex vulnerabilities
- Security research and documentation
Progressive Loading
When analysis completes, RAPTOR automatically loads
tiers/analysis-guidance.md for enhanced adversarial thinking capabilities.- Initial Analysis: Base LLM knowledge
- Enhanced Analysis: Loads offensive security guidance
- Exploit Development: Loads exploit constraint analysis
- Recovery: Loads error recovery protocols if needed
Related Commands
/scan
Generate SARIF findings to analyze
/codeql
Deep static analysis for complex issues
/validate
Validate exploitability before analysis
/exploit
Generate exploits from analysis
Notes
- Requires existing SARIF file from previous scan
- Analysis quality depends on LLM model capabilities
- Use with
/validatefor exploitability verification - Output includes prioritization for remediation
- For security research and authorized testing only