• Menu
  • Skip to right header navigation
  • Skip to main content
  • Skip to primary sidebar

DigiBanker

Bringing you cutting-edge new technologies and disruptive financial innovations.

  • Home
  • Pricing
  • Features
    • Overview Of Features
    • Search
    • Favorites
  • Share!
  • Log In
  • Home
  • Pricing
  • Features
    • Overview Of Features
    • Search
    • Favorites
  • Share!
  • Log In

Kusari’s AI-based pull request tool provides security risk analysis early during the pull request process, adds real-time inspection and clear “safe to merge” guidance and remediates vulnerabilities before code integration

June 18, 2025 //  by Finnovate

Software supply chain security company Kusari unveiled Kusari Inspector, an AI-based pull request security tool that provides security risk analysis early during the pull request process and address them before code integration. In addition to core supply chain analysis, Kusari Inspector adds real-time pull-request inspection and clear “safe to merge” guidance. Using the tool, developers receive instant, annotated reports with inline explanations, plus step-by-step remediation instructions that flag exposed secrets, misconfigurations, risky licenses and typo-squatted dependencies. Kusari Inspector prioritizes risk by ranking vulnerable or low-trust dependencies, both direct and transitive against trusted sources such as Common Vulnerability Scoring System, Exploit Prediction Scoring System and the Known Exploited Vulnerabilities catalog. The idea is that by filtering out non-exploitable issues, the tool cuts alert noise and keeps teams focused on the threats that matter most. The AI model used by Kusari Inspector continuously learns from each codebase to refine its recommendations. Engineers can chat with the assistant to clarify findings, customize security standards and receive precise coding fixes that accelerate approvals. Additionally, it generates Software Bill of Materials data to support compliance and bolster software supply chain resilience from development through deployment.

Read Article

Category: Members, Cybersecurity, Innovation Topics

Previous Post: « Kyndryl to integrate Commvault’s immutable data vault based on zero-trust principles that secures backup data from unauthorized access and forensic analysis module into its cyber resiliency services
Next Post: Coralogix’s AI agent simplifies access to deep observability data by translating natural language queries into detailed, system-level answers via a conversational platform »

Copyright © 2025 Finnovate Research · All Rights Reserved · Privacy Policy
Finnovate Research · Knyvett House · Watermans Business Park · The Causeway Staines · TW18 3BA · United Kingdom · About · Contact Us · Tel: +44-20-3070-0188

We use cookies to provide the best website experience for you. If you continue to use this site we will assume that you are happy with it.