From Detection to Remediation: It’s Time to Rethink AppSec Around Exploitability and Root Cause Fixes

Learn how Wiz is fundamentally changing AppSec by using the Security Graph to connect validated runtime vulnerabilities directly back to source code. Stop chasing alerts and fix what’s truly exploitable.

Five years after Log4Shell, the industry faced another critical RCE, this time in the React and Next.js ecosystems. Nearly 40% of cloud environments were affected by React2Shell, and exploitation was observed in the wild within hours.

Despite years of investment in scanners and “shifting left,” many teams were still unprepared, finding themselves flooded with SCA findings. Knowing a vulnerability exists is no longer enough. Teams need to know whether it is exposed, reachable, and how to fix it at the source. Yet tracing a critical runtime vulnerability back to code still relies on spreadsheets, tribal knowledge, or fragile CMDB mappings.

Wiz closes that loop. We’ve extended the Wiz Security Graph to connect validated runtime vulnerabilities from the Wiz Attack Surface Scanner (ASM) directly back to their source code. This allows teams to fix the most critical risks first, at their root cause.

It’s not about shifting left or shielding right; it’s about connecting the two into a single, unified workflow.

From Theoretical CVE to Validated Attack Path: Exposing Exploitable Risk

Not every vulnerable dependency results in real exposure. The real question is whether that vulnerability made it to production and is reachable from the outside world.

When the Attack Surface Scanner detects an internet-exposed application, it safely probes the endpoint with a crafted payload. When exploitation is confirmed, the Wiz Security Graph immediately correlates the signal with the corresponding finding in the code, raised by Wiz Code’s SCA scanner.

What was once a theoretical CVE becomes a validated attack path, clearly marked as "Validated External Risk" and "Has Code Remediation". Teams now have a risk they can act on immediately.

Filter risk issues with validated external risks and a path to remediate in code.
Focus on vulnerabilities proven exploitable by the Wiz Attack Surface Scanner.

End the Guesswork: Full Traceability with the Code-to-Cloud Pipeline

Once a risk is validated, Wiz doesn’t just generate another alert. It provides full traceability through the Code-to-Cloud Pipeline, showing the complete lineage of the issue across four stages:

  • Source: The repository and exact manifest file

  • Build: The CI job and commit hash

  • Artifact: The container image and registry

  • Runtime: The running workload and external exposure

Wiz Code to Cloud Pipeline showing the propagation of a vulnerability from code to runtime

This lineage is built automatically by the Wiz Security Graph. No manual tagging, no custom CI configuration, and no agents required.

One-Click Remediation: From Validated Finding to Pull Request

Detection only matters if remediation is easy. From a validated runtime finding, users can click Remediate, review the recommended fix, such as upgrading a dependency in package.json, and open a pull request directly against the source repository.

Open a fix PR directly from Wiz

The fix lands exactly where developers already work, with clear context on why the issue matters and where it is running in production.

Teams can also interact with Mika AI, which pulls in the Issues Expert agent to provide deeper guidance. Beyond a simple upgrade, the agent may recommend additional mitigations, such as middleware protections or compensating controls, to further reduce risk. In addition to mitigating the risk, developers learn code security best practices by doing.

Explore additional mitigating controls with Mika AI and the Issues Expert

Tame the Long Tail of Vulnerabilities: How Wiz Solves Security Debt

Not every risk needs the same response or the same timeline. After addressing an urgent RCE, teams are left with the long tail: hundreds, if not thousands, of lower-severity findings that accumulate over time. While not immediately exploitable, they create important security debt and compliance drag.

Wiz addresses this with Posture Issues. These are equivalent to fix campaigns, designed for medium- and long-term remediation.

Because a single vulnerable package or library can propagate across dozens of services, traditional tools surface this as hundreds of separate findings. Wiz flips that model. By grouping vulnerabilities by their source-mapped code finding, Wiz consolidates every runtime issue that traces back to the same component (unique dependency in a code repository) into a single, actionable problem.

Group vulnerabilities in cloud workloads by their unique component in code (root cause)
NextJS library in code causing multiple critical vulnerability findings in cloud environment

This enables teams to:

  • Define clear, achievable remediation goals (for example, “remove this vulnerable dependency everywhere”).

  • Align AppSec and development teams around shared objectives.

  • Drive lasting posture improvements, not just point-in-time fixes.

Instead of patching workloads one by one, teams fix the root cause in code and collapse an entire class of weaknesses across the environment. The blast radius becomes an advantage; a single fix that delivers broad risk reduction.

Short-term, Wiz helps you respond to critical issues. Long-term, it helps you systematically keep risk down.

Adopt an AppSec Model Aligned with Modern Applications

This capability is available now. If you’re a Wiz customer, start by filtering your risk issues by "Validated External Risk" and "Has Code Remediation". Fix what’s exploitable and stop chasing noise.

Learn more about Wiz Attack Surface Management and Wiz Code SCA in the documentation (login required).

Continuer la lecture

Obtenez une démo personnalisée

Prêt(e) à voir Wiz en action ?

"La meilleure expérience utilisateur que j’ai jamais vue, offre une visibilité totale sur les workloads cloud."
David EstlickRSSI
"Wiz fournit une interface unique pour voir ce qui se passe dans nos environnements cloud."
Adam FletcherChef du service de sécurité
"Nous savons que si Wiz identifie quelque chose comme critique, c’est qu’il l’est réellement."
Greg PoniatowskiResponsable de la gestion des menaces et des vulnérabilités