• Menu
  • Skip to right header navigation
  • Skip to main content
  • Skip to primary sidebar

DigiBanker

Bringing you cutting-edge new technologies and disruptive financial innovations.

  • Home
  • Pricing
  • Features
    • Overview Of Features
    • Search
    • Favorites
  • Share!
  • Log In
  • Home
  • Pricing
  • Features
    • Overview Of Features
    • Search
    • Favorites
  • Share!
  • Log In

Automated code review platform Coana allows security teams to determine whether identified vulnerabilities in a codebase are actually exploitable by constructing detailed call graphs through static control-flow analysis

April 25, 2025 //  by Finnovate

Supply chain security startup Socket has acquired cloud-based automated code review software startup Coana ApS for an undisclosed sum. Coana’s offerings include reachability analysis, a method that determines whether identified vulnerabilities in code dependencies are actually exploitable within a specific application. The approach involves constructing detailed call graphs through static control-flow analysis to identify which parts of the code are reachable and which are not, allowing developers to focus on genuine threats. The startups says its methodology significantly reduces false positives by over 80% compared with traditional software composition analysis tools by filtering out irrelevant alerts to allow security teams to prioritize and remediate critical vulnerabilities more efficiently. The technology can be easily integrated into existing development workflows and works on-premise without the need for complex configurations, according to the company. Coana will bring powerful static control flow and call graph analysis to Socket’s platform, allowing teams to prioritize vulnerabilities based on whether they’re actually exploitable in a given codebase.

Read Article

Category: Members, Cybersecurity, Innovation Topics

Previous Post: « Startup Sentient’s new system for deploying AI applications in Trusted Execution Environments uses confidential computing to ensure full data isolation, verifiability and attestation
Next Post: Entro Security’s gen AI adds context to exposed secrets and non-human identity risks by creating structured, natural language summaries and auto-classifying each finding based on metadata »

Copyright © 2025 Finnovate Research · All Rights Reserved · Privacy Policy
Finnovate Research · Knyvett House · Watermans Business Park · The Causeway Staines · TW18 3BA · United Kingdom · About · Contact Us · Tel: +44-20-3070-0188

We use cookies to provide the best website experience for you. If you continue to use this site we will assume that you are happy with it.