US 12,443,397 B2
Techniques for code fingerprinting
Eshel Yaron, Amsterdam (NL); Barak Bercovitz, Even-Yehuda (IL); and Tomer Schwartz, Tel Aviv (IL)
Assigned to Wiz, Inc., New York, NY (US)
Filed by Dazz, Inc., San Francisco, CA (US)
Filed on Apr. 3, 2025, as Appl. No. 19/169,671.
Application 19/169,671 is a continuation of application No. 18/593,470, filed on Mar. 1, 2024.
Prior Publication US 2025/0278255 A1, Sep. 4, 2025
Int. Cl. G06F 8/36 (2018.01); G06F 8/35 (2018.01)
CPC G06F 8/36 (2013.01) [G06F 8/35 (2013.01)] 19 Claims
OG exemplary drawing
 
1. A method for anomaly remediation, comprising:
scanning a code repository including a plurality of software components by executing fingerprinting code on the code repository in order to generate a plurality of statistics vectors for the plurality of software components, wherein each statistics vector includes a plurality of values representing statistics for respective aspects of a corresponding software component of the plurality of software components, wherein the fingerprinting code includes instructions that configure a processing circuitry to perform a text search in order to identify instances of patterns in the code repository and to generate the plurality of statistics vectors based on the identified instances of patterns when the fingerprinting code is executed;
clustering the plurality of statistics vectors into a plurality of clusters defined with respect to a plurality of software component groupings, wherein each cluster of the plurality of clusters includes a subset of the plurality of statistics vectors of corresponding to a subset of the plurality of software components which belongs to one of the plurality of software component groupings;
aggregating the plurality of statistics vectors into a plurality of aggregated statistics vectors by combining values of respective statistics in statistics vectors among the plurality of statistics vectors belonging to a same cluster of the plurality of clusters;
detecting at least one anomaly based on the plurality of aggregated statistics vectors; and
performing at least one remedial action with respect to the plurality of software components based on the detected at least one anomaly.