π₯ Vulnerability Prioritization
Overview
Myrror enhances vulnerability prioritization by evaluating not just the presence of vulnerabilities within the code, but also their reachability and exploitability. This approach helps minimize alert fatigue by focusing on the vulnerabilities that pose actual threats.
Key Features
Reachability Analysis
Myrrorβs Reachability Engine evaluates whether parts of the code that contain vulnerabilities are actually accessible during operation, not just theoretically based on manifest files. This analysis includes:
- Checking both direct and transitive dependencies.
- Flagging only those vulnerabilities that are practically reachable, providing a reliable basis for targeted remediation efforts.
Exploitability Analysis
While reachability assesses if vulnerable code can be accessed, Myrrorβs Exploitability Analysis determines whether it can actually be exploited:
- Analyzing the conditions under which a vulnerability can be exploited.
- Providing flags for vulnerabilities for which exploits are known to be available, allowing for deeper prioritization.
Shift Left Approach
Myrror incorporates a Shift Left approach in its static reachability analysis to detect vulnerabilities early in the Software Development Life Cycle (SDLC):
- Emphasizing early detection to prevent vulnerabilities from reaching production.
- Reducing the risk and cost associated with late-stage fixes.
Operational Procedure
Discovery
- Once connected to the Source Code Management (SCM) system, Myrror initiates a discovery process to identify all dependencies within the organization.
Vulnerability Detection
- The system begins the vulnerability detection process, identifying all known vulnerabilities and potential supply chain attack attempts across monitored repositories.
Prioritization
- The Reachability Engine checks if the vulnerable package is practically reachable.
- The Exploitability Engine assesses whether an active exploit exists for the vulnerability.
- Myrror also checks for the availability of fixes for identified issues.
- A prioritized and actionable list of vulnerabilities is provided, enabling teams to focus on remediating the most relevant threats.