Code Intelligence

Writing secure and stable software shouldn't be hard.

2024-01-11

How do Cybersecurity Assurance Levels work in ISO 21434? ๐Ÿš—

Like other automotive standards, ISO 21434 recommends using CALs to determine the rigor of testing activities. Our latest blog post sheds some light on how CALs can be used to build robust software in compliance with ISO 21434.

Topics include:
โžก How CALs work
โžก The difference between CALs and risk values
โžก The role of fuzz testing within CALs

Dive in: code-intelligence.com/blog/iso

The role of cybersecurity assurance levels in ISO 21434
2023-10-10

The waiting list for early access to CI Spark is now openโœจ

Be among the first to break down the barriers in dynamic white-box testing with our LLM-powered AI assistant.

Enroll for early access: code-intelligence.com/live-dem

#AppSec #AI #SoftwareTesting #llm

2023-09-28

Happening now!๐Ÿšจ

Don't miss out on our live demo, where Code Intelligence co-founder Khaled Yakdan
will show you how to break the barrier of dynamic testing through detecting and autoconfiguring entry points with CI Spark.

Sign Up Here: code-intelligence.com/live-dem

2023-09-21

Join us for a live demo of CI Spark next week: code-intelligence.com/live-dem

2023-09-20

Meet CI Sparkโœจ
Our new #LLM-powered AI assistant for detecting and autoconfiguring entry points.

Initial results show an acceleration of 1500%, reducing the workload for onboarding new projects from several days to under three hours!

More in our blog: code-intelligence.com/blog/ci-

2023-08-21

Third-party code has become irreplaceable.
However, it comes with great risk ๐Ÿ”ด

Join us live as @metzmanj from @GoogleOSS discusses how our collaboration enabled them to uncover severe security issues in popular open-source libraries.
#Java #javascript

code-intelligence.com/webinar/

2023-08-17

We found a prototype pollution vulnerability in tree-kit: CVE-2023-38894 ๐Ÿšจ

More info in our blog: code-intelligence.com/blog/tre

#treekit #prototypepollution #javascript #npmjs

2023-07-27

How we found a Prototype Pollution in protobuf.js - Live Demo ๐Ÿšจ

Our team has recently found a prototype pollution vulnerability in protobuf.js (CVE-2023-36665).

With a high CVSS Score of 9.8, this vulnerability would have put affected applications at risk of remote code execution and denial of service attacks.

Our colleague Peter Samarin wrote the bug detector behind it all, and will be giving a live demo of how this CVE was found.

Thursday, August 10th at 4:00 PM CEST/ 10:00 AM EDT

Sign up and reserve your spot today. โฐ

code-intelligence.com/webinar/

#javascript #cve #cybersecurity

2023-07-11

We found a prototype pollution vulnerability in protobufjs: CVE-2023-36665 ๐Ÿšจ
Snyk CVSS Score: 8.6 (high)

Affected applications are at risk of remote code execution and denial of service attacks. The vulnerability was found by our open-source JavaScript fuzzer Jazzer.js, running in Google's OSS-Fuzz.

Mitigation:
Versions from 6.10.0 to 7.2.4 are affected and hence vulnerable to prototype pollution. The maintainer issued an update that fixed this vulnerability on April 18, 2023. We strongly recommend that impacted users upgrade to newer versions that include the fixes, i.e., version 7.2.4 and above.

Hats off to our colleague Peter for writing the bug detector and disclosing the vulnerability to the project maintainer ๐Ÿ™Œ

More info in our blog: code-intelligence.com/blog/cve

#javascript #jazzerjs #cve #opensource #protobufjs

2023-07-05

AI Is fundamentally transforming the SDLC ๐Ÿ”„

We published a new whitepaper taking an in-depth look at how self-learning AI will reshape the SDLC and the way we write, test and deploy code.

Get your copy at code-intelligence.com/ai

#softwaredevelopment #Softwareengineering #ai

The future of productive developement (whiteapper)
2023-06-29

Join us today at 4:00 PM CEST / 10:00 AM EDT!

Come meet Code Intelligence CTO Niklas Henrich live and join a discussion on how your unit tests can be enhanced with self-learning AI to reveal bugs and security vulnerabilities that would otherwise go unnoticed.

Stay tuned to the end for interactive questions and a live Q&A.

code-intelligence.com/webinar/

#unittests #springboot #apitest

2023-06-15

๐“๐ก๐ž ๐…๐ฎ๐ญ๐ฎ๐ซ๐ž ๐จ๐Ÿ ๐๐ซ๐จ๐๐ฎ๐œ๐ญ๐ข๐ฏ๐ž ๐’๐จ๐Ÿ๐ญ๐ฐ๐š๐ซ๐ž ๐ƒ๐ž๐ฏ๐ž๐ฅ๐จ๐ฉ๐ฆ๐ž๐ง๐ญ: ๐’๐ž๐ฅ๐Ÿ-๐‹๐ž๐š๐ซ๐ง๐ข๐ง๐  ๐€๐ˆ ๐Ÿ๐จ๐ซ ๐š ๐’๐ž๐œ๐ฎ๐ซ๐ž ๐“๐จ๐ฆ๐จ๐ซ๐ซ๐จ๐ฐ

Last week, our CEO Sergej Dechand led viewers through a live discussion of the transformative power of self-learning AI in software development.

We would like to thank all of our viewers for the great questions and discussions at the end!

Missed our live event? Donโ€™t worry, you can watch it anytime on demand.

Check out the recording to learn about
- the trajectory of current trends
- leveraging self-learning AI to build secure software
- the role of AI across the different stages of the SDLC

Learn more here:
code-intelligence.com/webinar/

2023-04-17

Jazzer just found another Expression DoS vulnerability in Spring (CVE-2023-20863)

CVSS score: 7.5 ๐Ÿšจ

As part of Googleโ€™s OSS-Fuzz, Jazzer recently found CVE-2023-20861 within Spring. Now, 3 weeks later, it yielded another, more severe Expression DoS.

More info in our blog: code-intelligence.com/blog/exp

2023-04-04

To those who missed it, this was our special feature for April Fool's day:

2023-04-01

New Feature: Catch โ€˜em all with CI Instant Fix! ๐Ÿ†•

Try it out in 4 easy steps:
1๏ธโƒฃ Log in to the CI App: app.code-intelligence.com (requires GitHub sign-in)

2๏ธโƒฃ Click on the application you want to instantly fix

3๏ธโƒฃ Click on CI Instant Fix

4๏ธโƒฃ Catch 'em all!

#Fuzzing #Security #AprilFoolsDay

2023-02-17

Jazzer.js now integrates with Jest ๐Ÿฅณ

JavaScript developers can now test their applications for both functional and security issues at the same time.

The Jazzer.js fuzzing engine helps to find critical security vulnerabilities by generating invalid or unexpected inputs.

This is now possible using the familiar syntax of unit testing in Jest.

More on this in our blog: code-intelligence.com/blog/fuz

@joshin4colours will also host a coding session next week to demo this integration: linkedin.com/video/event/urn:l

Let us know which other frameworks you would like to see Jazzer.js support for!

Code Intelligence boosted:
2023-01-30

FuzzingWeekly CW4:

Critical RCE Vulnerabilities Found in git (CVE-2022-4190, CVE-2022-23251) โžก๏ธ
helpnetsecurity.com/2023/01/19

Fuzzing the Shield: CVE-2022-24548 โžก๏ธ
medium.com/s2wblog/fuzzing-the

A Framework for Blackbox Fuzzing Using Context-Free Grammars โžก๏ธ
shorturl.at/hNOSY

2023-01-24

@joshin4colours explained fuzz testing without using any code:
youtu.be/cC9HtSDBRNk

2023-01-23

RT @CyresConsulting@twitter.com

Last night was a successful kick-off for the ๐Ÿ๐ŸŽ๐Ÿ๐Ÿ‘ ๐€๐ฎ๐ญ๐จ๐ฆ๐จ๐ญ๐ข๐ฏ๐ž ๐‚๐ฒ๐›๐ž๐ซ๐ฌ๐ž๐œ๐ฎ๐ซ๐ข๐ญ๐ฒ ๐€๐Ÿ๐ญ๐ž๐ซ๐ฐ๐จ๐ซ๐ค - ๐Œ๐ฎ๐ง๐ข๐œ๐ก ๐Œ๐ž๐ž๐ญ๐ฎ๐ฉ ๐„๐ฏ๐ž๐ง๐ญ ๐’๐ž๐ซ๐ข๐ž๐ฌ ๐Ÿ™Œ There were drinks, snacks, views and a live #fuzztesting demonstration.

๐Ÿฆ๐Ÿ”—: twitter.com/CyresConsulting/st

2023-01-19

Join our latest livestream with fuzzing expert @joshin4colours@twitter.com, where he will demonstrate how automated fuzz testing can quickly and simply identify the Log4j vulnerability in under 10 minutes.

February 9th, 2023 at 4PM CET

code-intelligence.com/webinar/

#java #fuzzing #unittesting

Client Info

Server: https://mastodon.social
Version: 2025.04
Repository: https://github.com/cyevgeniy/lmst