Design a Developer-First Vulnerability Platform for enterprises
Recently I was checking the GitHub Advanced Security and other application such as Synk to comprehend how they are screening/scanning the CVE issues associated with my code and flagging us in CI/CD pipeline
Most security tools are great at finding bugs but terrible at fixing them. In many organizations, security teams throw massive lists of CVEs at developers without any context. This leads to alert fatigue, where "Critical" often means nothing because the library isn't even used in production.
To fix this, we need a platform that is context-aware, event-driven, and outcome-oriented.
2. High-Level Architecture
The platform is designed as a distributed, event-driven pipeline. It treats every code push or new CVE discovery as a data event that must be enriched before it reaches a human.
HOW CVE ARE CAPTURED
Simple matching flow
Example
If KB says:
And your graph has log4j-core@2.14.1, it matches CVE and becomes a finding.
Why Dedup is required ?
Recommended by LinkedIn
Why duplicates happen
What deduplication does
Flow diagram :
Event flow state:
Note:
To keep the article concise, I have not outlined the database schema and the design choices I made. This is intended to provide a bird’s-eye view of the problem and the possible solution paths that we typically explore and use in our day-to-day development work.
References: