How It Works

Kodem CORE: A unified engine that connects code and runtime

A revolutionary approach that integrates static and runtime analysis to provide full-stack visibility, precise prioritization, and actionable remediation.

Contextual Observability & Remediation Engine (C.O.R.E)

Securing your application stack with unprecedented depth and clarity

Kodem CORE seamlessly correlates insights from both static and runtime analysis. Powered by proprietary sensors and integrations, it delivers low-overhead observability across the entire application lifecycle - from code repositories to runtime environments.

Architecture Overview
Code
Container
Runtime
Kodem CORE Engine
Correlation Engine
Risk Verifier
Remediation Planner
Runtime Intelligence

Code-to-Runtime Security - A connected three phased approach

Kodem CORE’s workflow is split into three phases: Collect, Correlate, and Confirm.

phase
01.

Collect

Data Sources and Analysis Performed by Kodem CORE

1. Code Repositories

The Kodem CORE engine integrates directly with source control management (SCM) systems to extract and analyze data at the source code level. The engine performs the following operations:

  • Static Code Analysis: Applies a combination of rule-based and contextual parsing techniques to identify coding flaws, misconfigurations, and potential vulnerabilities.
  • Dependency Mapping: Constructs a comprehensive graph of direct and transitive dependencies, identifying vulnerable third-party libraries that may propagate security risks.
  • Function-level Reachability: Evaluates the call graph to determine whether identified vulnerabilities are reachable and exploitable during runtime. This reduces the scope of irrelevant vulnerabilities by focusing on execution paths.

2. Container Registries

At the container level, Kodem CORE inspects container images to identify vulnerabilities introduced through dependencies and environment configurations. The analysis includes:

  • Binary Analysis: Decompiles and scans binary files within container images to detect known vulnerabilities and code anomalies, focusing on compiled libraries and executables.
  • Base Image Classification: Analyzes the hierarchy and provenance of base images used in container builds, identifying outdated or insecure versions. This process ensures that foundational layers are free of critical security flaws.

3. Runtime Environments

Kodem CORE leverages various low level technologies, such as eBPF (extended Berkeley Packet Filter) to perform a real-time, low overhead monitoring of runtime environments This includes:

  • Memory Analysis: Identifies vulnerable code or libraries loaded into memory during execution. This enables the detection of actively exploitable vulnerabilities that static analyses cannot identify.
  • OS-Level Dependencies: Maps system-level dependencies, including dynamically loaded libraries and drivers, to detect security risks stemming from external packages.
  • Network-Level Events: Analyzes runtime network interactions, monitoring traffic patterns for anomalous behaviors or unauthorized communications that may indicate compromise.
  • OS-Level Events: Tracks critical system operations, such as process creation, file access, and privilege escalations, to detect potential exploitation attempts in real time.
  • Comprehensive Observability: By collecting and analyzing data across these three sources—code repositories, container registries, and runtime environments—Kodem CORE provides a multi-dimensional security profile of the application stack. This holistic approach enables security teams to prioritize and remediate vulnerabilities with high accuracy while minimizing false positives.
- See less
+ Read More
phase
02.

Correlate

1. Events Aggregators

The Events aggregator integrates runtime signals—memory usage, network activity, and OS-level events—into a unified dataset. This enables holistic application analysis and eliminates noise by consolidating relevant security insights.

2. Repository to Image Correlator

The Repo-to-Image Correlator maps container images with specific vulnerabilities directly to the source repositories containing the code or dependencies responsible for those vulnerabilities.

3. Runtime Behavioral Analyzer

The Runtime Behavioral Analyzer monitors execution paths and system interactions in real time. By mapping events to workflows, it identifies anomalies and confirms vulnerabilities that are actively exploitable in production environments.

- See less
+ Read More
phase
03.

Confirm

1. Real-Time Data Validation

  • Confirms whether identified vulnerabilities are actively exploitable by correlating runtime behavior with static findings.
  • Validates loaded libraries, executed code paths, and active system dependencies to ensure prioritized risks are actionable.

2. Attack Chain Mapping (MITRE ATT&CK)

  • Aligns vulnerabilities with the MITRE ATT&CK framework to simulate potential attack scenarios.
  • Maps and visualizes attack paths, enabling security teams to disrupt critical chains before exploitation occurs.
  • Provides actionable insights into how vulnerabilities impact overall application security posture.

3. Remediation Engine

  • Analyzes and provides tailored remediation plans for vulnerabilities in both direct and transitive (upstream, indirect) dependencies, as well as proprietary source code.
  • Delivers actionable steps that factor in runtime context, exploitability, and the potential impact of changes.
  • Verifies the effectiveness of fixes by validating against runtime behavior and mapped attack paths, ensuring that all vulnerabilities are resolved securely.
  • Tracks remediation progress and integrates with CI/CD workflows to ensure continuous security improvement without disrupting development pipelines.
- See less
+ Read More
Tailored intelligence, purpose-built to secure your unique application

Kodem Runtime Intelligence: 

The end of garbage in-garbage out

Kodem AI revolutionizes AppSec with automated triage, remediation, and red-team simulations obtained from our proprietary runtime intelligence. It delivers precise, actionable insights, cutting through noise and inefficiencies for smarter, faster security throughout your application's lifecycle.

Key AI Features

Triage Copilot

Automates prioritization of critical vulnerabilities.

Remediation Copilot

Provides actionable, context-specific fix instructions..

Virtual Red-Team

Simulates potential attack scenarios to identify weaknesses.

Noise Reduction

Filters out irrelevant alerts for improved focus.

Deepen Your Knowledge

Learn about Runtime Intelligence and our eBPF sensor technology to understand the technology behind Kodem CORE.