CPC H04L 63/1433 (2013.01) [G06F 16/24573 (2019.01); G06F 16/25 (2019.01); G06F 21/577 (2013.01); H04L 45/121 (2013.01); H04L 45/22 (2013.01); H04L 45/38 (2013.01)] | 20 Claims |
1. A method, comprising:
identifying application source code that has been committed to a repository;
scanning one or more functions of the application source code to identify a data file retrieved by the one or more functions, wherein the application source code implements the data file when executing the one or more functions;
retrieving metadata corresponding to the data file;
determining that the metadata indicates that the data file has been designated as sensitive data;
in response to the determining, generating a security vulnerability alert on a graphical user interface (GUI) dashboard;
scanning the one or more functions of the application source code to determine a number of automated data pull requests; and
automatically implementing a fix for the security vulnerability based on the automated data pull requests.
|