Code Security Enhancements, Full Scan Support, Image Vulnerability Triaging, and More
Code Security Enhancements
With this release, there are major enhancements to Code Security:
- Dedicated sections for Secrets and Vulnerabilities to dig deeper into occurrences, mapping them to files and scans.
- Improved triaging of detected secrets and vulnerabilities.
The secrets scan dashboard
List of vulnerabilities in code


Full Scan Support
Initiate a Full Scan for GitHub or Bitbucket repositories directly from the Cloudanix Console.
This provides flexibility to start scans at will, in addition to the Weekly Automated Full Scans.
Full Scan Report for GitHub or Bitbucket

PR Check, Status, and Comments
With the latest release, customers can:
- Enforce PR Checks to fail builds based on acceptable conditions
- Add automated comments in PRs based on findings
- Insert findings status in the PRs
This reduces friction between Engineering and Security by limiting security gaps in code from reaching production.
Enforce PR Checks to fail builds based on an acceptable condition

Image Vulnerability Triage
Slice and dice image vulnerability data even further using CVE or package-based filters.
Misconfiguration Policy Enhancements
We’ve expanded our AWS Misconfiguration Policy Set by another 150 policies, bringing the total to over 610. These additions provide parity with AWS Config and cover security rules across most AWS services.
Cloudanix Blogs
- Integrate IAM JIT for AWS Identity Center
- CSPM & Challenges of CSPM
- Real-Time Threat and Anomaly Detection for Workloads on AWS (co-authored with AWS)
- Announcing Cloudanix Code Security: Elevate Your Code’s Defense
Additional Resources
- Benefits of Using the Right CIEM Solution and How To Choose
- What is Code Security?
- What is Platform Engineering?
Industry News
- A Deep Dive of AWS Ransomware Attack
- Rippling’s Unique Take on Building SIEM In-House
- Declarative Images Using Code at ChainGuard
- Least Privilege and the False Sense of Security
- GitHub’s Approach to Security, Availability, and Accessibility
TODO:// is not an option for Cloud Security
Security for your Code, Cloud and Data
Cloudanix replaces your 5-6 disjointed security tools within 30 minutes.
Get StartedBlog
Read More Posts
Your Trusted Partner in Data Protection with Cutting-Edge Solutions for
Comprehensive Data Security.
Tuesday, Feb 10, 2026
The 2026 CNAPP Compliance Framework: Turning Audit from Crisis to Continuity
Introduction: The Death of the Point-in-Time Audit In the high-velocity cloud landscape of 2026, the traditional app
Read MoreThursday, Feb 05, 2026
CSPM vs. CNAPP: Navigating Cloud Security Evolution for Modern Enterprises
The shift to cloud-native architectures represents a fundamental change in how applications are designed, built, and dep
Read MoreThursday, Jan 22, 2026
Top 10 Identity and Access Management Solutions
Identity and Access Management (IAM) has traditionally been considered one of the boring parts of security. But with the
Read More