Code Analysis
Overview
Nullify analyzes first-party application code and infrastructure to find vulnerabilities before they reach production. It reviews every commit on your default branch and every pull request to catch issues early.
Nullify uses both top-down and bottom-up analysis to expose vulnerabilities:
Top-down analysis traces user input (HTTP requests, API calls, file uploads) through your application logic to identify unsafe data flows
Bottom-up analysis works backward from vulnerable operations (SQL queries, OS commands, serialization) to determine if untrusted data can reach them
This dual approach catches injection flaws, authentication bypasses, authorization failures, business logic bugs, and other code-level vulnerabilities that static patterns alone would miss.
Nullify also scans infrastructure-as-code (Terraform, CloudFormation, Kubernetes manifests, etc.) for misconfigurations that expose services, weaken access controls, or introduce compliance violations.
Coverage
Application Code
Injection flaws (SQL, NoSQL, command, LDAP, XPath, template)
Authentication and authorization failures
Broken access control (IDOR, privilege escalation)
Business logic flaws (race conditions, workflow bypass, price manipulation)
Unsafe deserialization
SSRF and XXE vulnerabilities
Sensitive data exposure and logging
Infrastructure-as-Code
Exposed services and overly permissive network rules
Weak IAM policies and overprivileged roles
Misconfigured secrets management
Compliance violations (encryption, retention, logging)
Last updated
Was this helpful?

