Multiple Lines
Multiple LinesMultiple Lines
Up Arrow
Back to Blog
Security

If It Doesn’t Execute, Ignore It

By 
Roi Abitboul

In a Kubernetes-based application lifecycle, libraries transition through distinct stages, each with different security implications. Understanding these stages helps prioritize vulnerability management efforts effectively and ensures accurate risk assessments. Below, we clearly define five stages from initial code definition to execution within Kubernetes, highlighting the true security risks at each point.

Stage 1: Defined in Repository and Stored in Registry

Initially, libraries exist as dependencies defined in repository files such as package.json, pom.xml, or go.mod. When dependencies are fetched during image builds, they are stored in container registries and become part of your application images. At this combined stage, the libraries exist physically within container images but remain inert. Traditional vulnerability scanners often flag these dependencies, yet they present no risk unless deployed or executed.

Stage 2: Deployed to Kubernetes Cluster

Deploying images onto a Kubernetes cluster makes libraries physically accessible within running pods. At this stage, libraries are installed and accessible within the container filesystem, but pose no risk at this stage. Many security tools inaccurately flag these libraries as immediate risks, causing unnecessary noise.

Stage 3: Loaded into Application Memory

When containers run in Kubernetes, libraries become loaded into application memory. At this stage, code is accessible and available for execution by the application. Despite increased exposure, these libraries pose no risk at this stage.

Stage 4: Library Executed but Vulnerable Function Not Invoked

At this stage, the library code is executed by the application at the CPU level, but the specific vulnerable functions or methods remain unused. Although execution occurs, vulnerabilities that are not explicitly triggered still do not represent an actual security risk. Accurate detection at this stage helps eliminate unnecessary alerts, further reducing noise and focusing attention where it matters.

Stage 5: Executed at Function Level

The highest and most accurate level of risk assessment occurs when specific vulnerable functions or methods within libraries are actively executed at the CPU level. Only at this granular stage does the vulnerability become fully actionable, clearly identifying risks needing immediate attention.

How Raven Achieves 97-99% Vulnerability Deprioritization

Traditional vulnerability management struggles with accurate prioritization, often creating excessive noise by failing to distinguish among these stages. Raven solves this by integrating detailed runtime analysis at the Kubernetes cluster level, focusing precisely on code paths and functions actually executed within the running containers. By clearly identifying and isolating actionable risks within the Kubernetes environment, Raven deprioritizes 97-99% of vulnerabilities. This precision empowers security teams to concentrate on genuine threats and significantly enhances operational efficiency.

Share this post
Yellow Lines

Get a Demo

Meeting Booked!
See you soon!
Until we meet, you might want to check out our blog
Oops! Something went wrong while submitting the form.
Ellipse
Security

7 Reasons Why Attackers Shifted Towards Cloud Applications

Attackers are increasingly shifting their focus from infrastructure to applications, exploiting vulnerabilities that traditional security measures cannot protect.
Read more
Security

The Critical Need for Cloud Runtime Application Security

While shift left strategies are essential for building secure applications, they are not sufficient on their own. Cloud runtime application security, or protect right, is crucial especially as attackers are increasingly shifting their focus to applications.
Read more
Security

What are CVE-Less Threats?

What CVE-less threats are, why they are becoming more prevalent, and how organizations can protect themselves against these insidious risks.
Read more
Yellow Lines