Xygeni Detectors
Bad ComponentsThe Suspect Dependencies Scanner finds suspect dependencies ( The aim is to detect potential flaws in the dependencies, direct or indirect, in the software project and DevOps tools around, so supply-chain attacks can be prevented. |
Hardcoded SecretsXygeni Secrets detects hardcoded secrets. Xygeni Secrets performs thorough scans of code, text files and docker images to identify exposed secrets (API keys, passwords, and other sensitive credentials). Such exposures can be exploited by malicious actors to leak data or gain unauthorized access to critical systems. |
Code TamperingA Code Tampering flaw is a security vulnerability that occurs when an attacker is able to perform an unauthorized malicious modification of the code of a program or system in a way that allows them to gain unauthorized access or control. |
Malware ScannerThis service proactively protects your software supply chain and supports the implementation of security gates to block malware threats before they infiltrate your application. |
MisconfigurationsA CI/CD misconfiguration in any element of the software pipeline, like a package manager, a build file, or a CI job, might open the door to attacks targeted at the organization’s DevOps chain. |
Unusual ActivityXygeni detects anomalies that indicate unauthorized modifications, access, or exploitations in real time. This proactive approach ensures that potential security breaches are addressed before they can escalate into serious threats. |
IaC FlawsAn IaC Flaw represents a "flaw" or "defect" (a non-compliance) for a certain policy, found in an Infrastructure-as-Code (IaC) template. Most flaws represent a security-related issue that adds significant risk. |
Compliance AssessmentCompliance Assessment checks compliance with Software Supply-Chain Security standards and guidelines. |