February 2025 Edition of Kodem Kernels

This month, we introduced several enhancements that empower entire teams to simplify their application security processes, prioritize issues based on impact and remediate vulnerabilities more precision. Our new features allow users to customize their code repository views, gain actionable insights inot package behavior through runtime and function-level data, automate workflows and integrate security scanning into their development environment.

These updates reflect our commitment to delivering comprehensive and intuitive tools that streamline application security workflows and enable teams to manage projects with greater clarity and control.

Gal Sapir
February 26, 2025
February 26, 2025

0 min read

Kodem Kernels - Product Updates
February 2025 Edition of Kodem Kernels

Code Repository Configuration

The new Code Repository Configuration tab empowers all users to customize how data is viewed and managed, particularly for monorepos.

This feature empowers teams to:

  • Configure monorepos into smaller projects for each manifest file and gain clear visibility into each repository's manifest files and folder tree, simplifying management.
  • Manually correlate deployed images to projects for better results and control over your security practices, ensuring a comprehensive understanding of the code’s operational context.
  • Achieve runtime indications at the repository level and benefit from more accurate fix suggestions, leveraging the new visibility from code to image.
  • Exclude specific paths from scans for targeted scanning in any repository, optimizing scanning strategies and resource utilization.
monorepo security support

Enhanced Runtime Evidence

The enhanced Runtime Evidence tab provides deeper insights into why issues are classified as runtime, enabling teams to prioritize vulnerabilities more effectively.

With this feature you can:

  • Understand the runtime context of issues with detailed evidence, including executed processes, loaded files and functions with vulnerable components, eliminating guess work about theoretical vs. actual risk.
  • Observe instances across multiple environments and download recent observations with timestamped runtime evidence, including full execution context, container image and environment details.
  • Validate vulnerability exploitation paths by tracking function calls in memory, allowing teams to prioritize fixes based on real runtime data.
runtime security

Workflows & Webhooks

The new Workflows feature automates processes and reduces manual overhead, empowering teams to streamline their security operations.

With Workflows, you can:

  • Set up resource-specific workflows tailored to your unique requirements, ensuring alignment with your organization's processes and policies.
  • Define event-driven triggers to initiate workflows automatically, such as new or modified open-source issues and new code issues, enabling proactive issue management.
  • Add granular control with conditions based on issue attributes like severity, score, EPSS, and runtime, allowing for targeted and efficient workflow execution.
  • Integrate seamlessly with existing systems using webhooks, facilitating real-time notifications and collaboration with other tools and teams.

{{demo-video="/314695942731"}}

Table of contents

Related blogs

When AppSec Implementation is Lightweight

Despite promising fast value, modern AppSec platforms often demand lengthy, high-friction onboarding. Teams are left managing alert noise, continuous configuration debt and fractured integrations. This friction stems from flawed implementation models, whether layered on top of the technology or baked into it, shaping how these platforms are adopted and operated.

February 3, 2026

4

From SBOM Inventory to Package Intelligence

How Kodem turns SBOM packages into the control plane for investigation, governance and remediation

January 14, 2026

Kai at Work: A Day in the Life of an AI AppSec Engineer

Kai, Kodem’s secure-by-design AI AppSec Engineer, is integrated directly into the platform to deliver contextualized and actionable answers precisely when AppSec teams need them. By converting your existing security data into conversational intelligence, Kai eliminates the need for hours of manual investigation and context-switching. You can now ask questions as you would to a senior, humble, and tireless engineer.

December 15, 2025

A Primer on Runtime Intelligence

See how Kodem's cutting-edge sensor technology revolutionizes application monitoring at the kernel level.

5.1k
Applications covered
1.1m
False positives eliminated
4.8k
Triage hours reduced

Platform Overview Video

Watch our short platform overview video to see how Kodem discovers real security risks in your code at runtime.

5.1k
Applications covered
1.1m
False positives eliminated
4.8k
Triage hours reduced

The State of the Application Security Workflow

This report aims to equip readers with actionable insights that can help future-proof their security programs. Kodem, the publisher of this report, purpose built a platform that bridges these gaps by unifying shift-left strategies with runtime monitoring and protection.

Get real-time insights across the full stack…code, containers, OS, and memory

Watch how Kodem’s runtime security platform detects and blocks attacks before they cause damage. No guesswork. Just precise, automated protection.

Combined author
Gal Sapir
Publish date

0 min read

Kodem Kernels - Product Updates