Code Analysis

Overview

Nullify analyzes first-party application code and infrastructure to find vulnerabilities before they reach production. It reviews every commit on your default branch and every pull request to catch issues early.

Nullify uses both top-down and bottom-up analysis to expose vulnerabilities:

  • Top-down analysis traces user input (HTTP requests, API calls, file uploads) through your application logic to identify unsafe data flows

  • Bottom-up analysis works backward from vulnerable operations (SQL queries, OS commands, serialization) to determine if untrusted data can reach them

This dual approach catches injection flaws, authentication bypasses, authorization failures, business logic bugs, and other code-level vulnerabilities that static patterns alone would miss.

Nullify also scans infrastructure-as-code (Terraform, CloudFormation, Kubernetes manifests, etc.) for misconfigurations that expose services, weaken access controls, or introduce compliance violations.

Coverage

Application Code

  • Injection flaws (SQL, NoSQL, command, LDAP, XPath, template)

  • Authentication and authorization failures

  • Broken access control (IDOR, privilege escalation)

  • Business logic flaws (race conditions, workflow bypass, price manipulation)

  • Unsafe deserialization

  • SSRF and XXE vulnerabilities

  • Sensitive data exposure and logging

Infrastructure-as-Code

  • Exposed services and overly permissive network rules

  • Weak IAM policies and overprivileged roles

  • Misconfigured secrets management

  • Compliance violations (encryption, retention, logging)

Last updated

Was this helpful?