Dependency Analysis
Overview
Nullify continuously monitors every package dependency for known CVEs and determines how risky they are within the context of your application and where it runs. It reviews all packages on your default branch periodically to catch new CVEs as they emerge, and analyzes every pull request to prevent new CVEs from being introduced. This combines vulnerability detection with application context to separate noise from genuine risk.
What It Delivers
Manifest discovery across
go.mod,package.json,pnpm-lock.yaml,yarn.lock,bun.lock,pom.xml,build.gradle,libs.versions.toml,requirements.txt,pyproject.toml,conda-lock.yml,Gemfile,.csproj,composer.json,Cargo.toml, and more.Enriched advisories that blend NVD, OSV, vendor feeds, and Nullify intelligence to calculate severity, exploitability, and affected services.
Reachability reasoning analyse how your programs use the vulnberable code in the dependency, not just whether it is called, and how exposed it is in the infrastructure.
Comprehensive triage compute a risk score comprised of technical and business context
Automated remediation for Go modules, npm/Yarn/pnpm, Bun, Maven, Gradle, PyPI/Conda, Composer, and Bundler with changelog summaries and optional PR creation.
See Supported Ecosystems for per-package details.
Last updated
Was this helpful?

