Skip to content
Home IAST Tools Datadog Code Security (IAST)
Datadog Code Security (IAST)

Datadog Code Security (IAST)

Category: IAST
License: Commercial
Suphi Cankurt
Suphi Cankurt
AppSec Enthusiast
Updated February 6, 2026
3 min read
Key Takeaways
  • Datadog IAST achieves 100% on the OWASP Benchmark with zero false positives, the highest published score among IAST tools.
  • Reuses existing Datadog APM tracing libraries — no separate agent needed for Java, .NET, Python, and Node.js applications.
  • Source-to-sink taint tracking provides code-level remediation details with exact file, method, and line number for each finding.
  • Part of the broader Datadog Code Security suite alongside SAST, SCA, IaC scanning, and secrets detection.

Datadog Code Security provides runtime code analysis (IAST) that detects vulnerabilities in running applications using the same tracing libraries that power Datadog APM. It supports Java, .NET, Python, and Node.js.

Datadog Code Security dashboard showing library vulnerabilities and security posture

The tool achieves 100% on the OWASP Benchmark with over twenty additional detection rules. Because it reuses your existing Datadog tracing setup, enabling IAST is a configuration flag away — no new agent to deploy.

Datadog IAST is part of the broader Code Security suite alongside Static Code Analysis (SAST), Software Composition Analysis (SCA), Infrastructure as Code security, and Secret Scanning.

What is Datadog Code Security (IAST)?

Datadog’s IAST monitors live applications by tracking how data flows through code at runtime. It instruments applications through the same tracing libraries used for APM. As requests move through your application, the tracer monitors data sources (user input, external APIs) and sinks (database queries, file operations, system commands). When untrusted data reaches a sink without proper validation, Datadog flags the vulnerability with the exact code location and data flow.

100% OWASP Benchmark
Correctly identifies all test vulnerabilities with zero false positives. This accuracy comes from analyzing actual runtime behavior rather than guessing from code patterns.
APM-Native Integration
Uses the same tracing libraries as Datadog APM. If you already run Datadog, enabling IAST is one environment variable. No new agent needed.
Datadog Severity Score
Prioritizes findings using environment context and real-time threat activity. See which vulnerabilities affect production services versus staging.

Key Features

FeatureDetails
Supported LanguagesJava (tracer 1.15.0+), .NET, Node.js (tracer 4.18.0+ / 5.0.0+), Python (preview)
OWASP Benchmark100% true positive rate, zero false positives
Agent RequirementDatadog Agent 7.41.1+
Enable FlagDD_IAST_ENABLED=true
DeploymentDocker, Kubernetes, Amazon ECS, AWS Fargate
Vulnerability TypesSQL injection, command injection, path traversal, LDAP injection, XSS, insecure deserialization
Code Security SuiteIAST + SAST + SCA + IaC + Secret Scanning
Source IntegrationGitHub (code view, blame, issue creation)

Runtime Vulnerability Detection

IAST detects vulnerabilities that need runtime context to identify. For each finding, Datadog provides the specific file name, method name, and line number where the vulnerability exists, plus the complete data flow from source to sink.

Datadog IAST vulnerability details showing SQL injection with file location and data flow

Detected vulnerability types include:

  • SQL Injection — tracks user input through string concatenation to database queries
  • Command Injection — identifies external input reaching system command execution
  • Path Traversal — detects unsanitized input in file system operations
  • LDAP Injection — monitors input flowing to directory service queries
  • XSS — tracks data from input to output rendering
  • Insecure Deserialization — identifies dangerous deserialization of untrusted data

Code-Level Remediation

When a vulnerability is found, Datadog shows the affected file, method, and line number along with remediation guidance specific to your framework. You can view the vulnerable code directly in Datadog if you connect your GitHub repositories.

Datadog IAST code snippet showing vulnerable source code with highlighted lines

GitHub integration adds:

  • Direct links to vulnerable code in your repository
  • Git blame information showing who introduced the vulnerability
  • The specific commit that introduced the issue
  • One-click issue creation in the relevant repository
  • Code owner identification
APM Context
Vulnerability findings appear alongside performance data in Datadog. You can see which endpoints have vulnerabilities, their traffic volume, and whether vulnerable code paths are actually reached in production. This helps prioritize fixes for high-traffic, business-critical services.

Severity Scoring

Datadog uses its own Severity Score that goes beyond static CVSS ratings. It factors in:

  • Whether the vulnerable service is running in production
  • Real-time threat activity and exploit availability
  • The environment context (dev, staging, production)
  • The relationship between vulnerable services, cloud workloads, and infrastructure

Getting Started

1
Ensure prerequisites — You need Datadog Agent 7.41.1+ and a compatible tracer version: Java 1.15.0+, Node.js 4.18.0+ (Node 16) or 5.0.0+ (Node 18), .NET, or Python.
2
Enable IAST — Add DD_IAST_ENABLED=true to your application’s environment variables. If you already use Datadog APM, this is all you need.
3
Run your application — Start your instrumented application and exercise it with functional tests, QA testing, or normal traffic. Datadog monitors data flow in the background.
4
Review findings — Vulnerabilities appear in the Code Security section of Datadog. Connect GitHub for code-level context, blame information, and one-click issue creation.

When to Use Datadog Code Security (IAST)

Datadog IAST is the natural pick if you already run Datadog APM. Enabling it takes one environment variable, and findings show up alongside the performance and reliability data your team already monitors.

Best For
Teams already using Datadog APM who want integrated vulnerability detection without deploying a separate security tool.

The 100% OWASP Benchmark accuracy means findings need investigation, not triage of false positives.

Consider alternatives if your applications use languages Datadog doesn’t support for IAST, or if you prefer standalone security tools not tied to an observability platform. Contrast Assess covers more languages (Java, .NET, Node.js, Python, Go, Ruby). Seeker IAST adds active verification and supports 14+ languages.

Frequently Asked Questions

What is Datadog Code Security (IAST)?
Datadog Code Security is a runtime code analysis (IAST) solution that detects vulnerabilities in running applications using the same tracing libraries that power Datadog APM. It supports Java, .NET, Python, and Node.js.
Is Datadog IAST free or commercial?
Datadog IAST is commercial, available as part of the Datadog platform with a 14-day free trial. Pricing is listed under the Runtime Code Security tab on the Datadog pricing page.
What is Datadog IAST's OWASP Benchmark score?
Datadog reports 100% on the OWASP Benchmark and over twenty additional detection rules. This means it correctly identifies all test vulnerabilities with zero false positives.
Does Datadog IAST require a separate agent?
No. Datadog IAST uses the same tracing libraries as Datadog APM. Enabling it requires adding the DD_IAST_ENABLED=true flag to your existing Datadog instrumentation. You also need Datadog Agent version 7.41.1 or higher.
What languages does Datadog IAST support?
Datadog IAST supports Java (tracer 1.15.0+), .NET, Node.js (tracer 4.18.0+ for Node 16, 5.0.0+ for Node 18), and Python (code-level detection in preview).