Powerful CI and SCM Policy Updates Ensure the Security of Builds and PRs

PRODUCT SPOTLIGHT

Kodem’s continuous integration and source code management enhancements provide development teams with more control, improved visibility, and smarter automation to ensure the security of builds and pull requests.

And we’re going one step further by addressing critical gaps that traditional SCA and reachability tools can’t—Kodem’s remediation guidance now includes transitive dependencies and upstream dependencies.

written by
Kodem Product Team
published on
September 12, 2024
topic
Application Security
Kodem News

At Kodem, we continuously push the envelope to ensure your security practices are solid and frictionless. As the demand for faster development cycles grows, the need for tighter security embedded into your CI/CD pipelines becomes essential. Today, we’re excited to announce two significant updates: Continuous Integration (CI) Policies and Source Code Management (SCM) Policy Enhancements, designed to elevate how security works within your pipelines and code repositories.

Whether you’re a developer, an application security leader, or an engineering team looking to ship faster, these new features ensure you can scale security without slowing down development.

And we’re going one step further by addressing critical gaps that traditional SCA and reachability tools can’t—Kodem’s remediation guidance now includes transitive dependencies and upstream dependencies.

Both of our updates aim to give you more control, better visibility, and smarter automation to keep your builds and pull requests secure.

Key Improvements to the CI Workflow

Kodem CI Tool

Real-time scanning during the build process to detect vulnerabilities, integrated directly into your existing CI tools like Jenkins and GitHub Actions.

Remediation Guidance for Transitive Dependencies

Kodem goes beyond direct vulnerabilities, providing actionable remediation guidance for transitive dependencies and upstream dependencies—an area most legacy SCA tools can’t handle.

remediation guidance for transitive dependencies and upstream dependencies

Customizable CI Policies

Define security policies based on your project’s needs, ensuring you catch vulnerabilities before they hit production.

Key Improvements to Source Code Management Policies

SCM Suppression Policies

Now you can suppress specific conditions in your SCM Policies, such as approving a CVE or package that doesn't meet the Protection Policy you’ve enabled. Suppression Policies can be tailored to specific scopes of code repositories.

Suppression Policies can be tailored to specific scopes of code repositories for effective source code managment

Enhanced PR Comment Scanning 

You’ll now see all PR scanning findings—including those failing the PR check—in a consolidated report. This update applies to new code added in the PR, and will help streamline the security review process.

PR Scanning Findings

SCM PR Policies are now available directly in GitHub, with more SCM tools to be supported soon.

SCM PR Policies are now available directly in GitHub

The Numerous Benefits for Application Security and Engineering Teams

Security teams can enforce policies within CI pipelines and PRs which is crucial for staying ahead of vulnerabilities, especially in fast-moving environments. 

Enforce Policies Early

CI Policies enable security teams to enforce rules at the earliest stages of development, ensuring that vulnerable code is caught during the build process.

Handle Complex Dependencies

Kodem’s transitive and upstream remediation ensures that vulnerabilities deep within your dependency tree aren’t overlooked—a gap that legacy tools fail to address.

Targeted Suppression 

Security teams can approve certain CVEs or packages with the new SCM Suppression Policies without loosening overall protection policies. This means teams can focus on real threats without creating unnecessary noise.

Comprehensive Visibility

Application Security teams get full visibility into both the vulnerabilities that block a PR and additional findings that may require attention, all in one place. This significantly reduces manual back-and-forth, making the remediation process smoother.

Engineering teams enjoy enhanced CI and SCM processes which provide a streamlined, security-first development ensuring effective source code security.

No More Bottlenecks

With real-time feedback during the build and PR process, developers can catch vulnerabilities early without waiting for manual reviews or security team approvals. Kodem integrates seamlessly into CI tools like Jenkins and GitHub Actions, ensuring security never slows you down.

Tailored Security

Customizable CI and SCM Policies give engineering teams the ability to set up security rules that match their project needs ensuring effective source code security. Whether it's flagging critical vulnerabilities or approving specific CVEs through Suppression Policies, Kodem adapts to your workflow.

Real-Time, Detailed Reports

With PR scanning results now fully embedded, developers can easily review all findings in one place. The new setup makes it easier to address security concerns without leaving the development platform, resulting in faster resolutions and cleaner code.

Transitive Dependency Fixes

Kodem’s remediation guidance doesn’t stop at direct dependencies. Transitive dependencies and upstream dependencies—often ignored by legacy tools—are flagged and include actionable advice, so your builds are as secure as possible without hidden risks.

Get Smarter, Faster, and More Efficient

Kodem’s CI and SCM updates are designed to make your security practices smarter, faster, and more effective. Whether you're an application security leader looking to automate and scale, or an engineering team trying to ship code faster, these new features offer the tools you need to stay secure without slowing down.

Now is the time to experience what Kodem can do for your development pipelines—secure every build, every pull request, every time.

Watch this short product demo to see how we do it >>

Blog written by

Kodem Product Team

More blogs

View all

When NPM Goes Rogue: The @ctrl/tinycolor Supply-Chain Attack

On September 15, 2025, researchers at StepSecurity and Socket disclosed a large, sophisticated supply-chain compromise in the NPM ecosystem. The incident centers around the popular package @ctrl/tinycolor (with over two million weekly downloads), but it extends far beyond: 40+ other packages across multiple maintainers were also compromised.

September 16, 2025

Malicious Packages Alert: The Qix npm Supply-Chain Attack: Lessons for the Ecosystem

The npm ecosystem is in the middle of a major supply-chain compromise. The maintainer known as Qix is currently targeted in a phishing campaign that allows attackers to bypass two-factor authentication and take over their npm account. This is happening right now, and malicious versions of widely used libraries are being published and distributed.

September 8, 2025

Security Issues in popular AI Runtimes - Node.js, Deno, and Bun

Node.js, Deno, and Bun are the primary runtimes for executing JavaScript and TypeScript in modern applications. They form the backbone of AI backends, serverless deployments, and orchestration layers. Each runtime introduces distinct application security issues. For product security teams, understanding these runtime weaknesses is essential because attacks often bypass framework-level defenses and exploit the runtime directly.

September 8, 2025

A Primer on Runtime Intelligence

See how Kodem's cutting-edge sensor technology revolutionizes application monitoring at the kernel level.

5.1k
Applications covered
1.1m
False positives eliminated
4.8k
Triage hours reduced

Platform Overview Video

Watch our short platform overview video to see how Kodem discovers real security risks in your code at runtime.

5.1k
Applications covered
1.1m
False positives eliminated
4.8k
Triage hours reduced

The State of the Application Security Workflow

This report aims to equip readers with actionable insights that can help future-proof their security programs. Kodem, the publisher of this report, purpose built a platform that bridges these gaps by unifying shift-left strategies with runtime monitoring and protection.

Get real-time insights across the full stack…code, containers, OS, and memory

Watch how Kodem’s runtime security platform detects and blocks attacks before they cause damage. No guesswork. Just precise, automated protection.

Stay up-to-date on Audit Nexus

A curated resource for the many updates to cybersecurity and AI risk regulations, frameworks, and standards.