Back to Varydn
Remediation

Find It. Fix It.
Ship It Securely.

When Varydn detects a finding, it doesn't just alert you. It generates a context-aware fix and can open a pull request automatically. Developers resolve security issues without needing to become security experts.

PR #248 Varydn auto-remediation
lib/auth/hash.go
- import "crypto/md5"
+ import "crypto/sha256"
 
func HashPassword(pw string) string {
- h := md5.Sum([]byte(pw))
- return hex.EncodeToString(h[:])
+ h := sha256.Sum256([]byte(pw))
+ return hex.EncodeToString(h[:])
}
Varydn: MD5 is cryptographically broken and must not be used for password hashing. Replaced with SHA-256. Consider bcrypt or argon2 for production password storage.
Workflow

From Finding to Fix in Minutes

Varydn closes the loop between detection and resolution without requiring security expertise from every developer on your team.

1 - Detection

Scanner identifies the finding. Severity, category, exact line, and CWE reference are recorded. The CI check is updated immediately.

2 - Guided Fix

Varydn generates a context-aware remediation recommendation, explaining what is wrong, why it matters, and precisely how to fix it.

3 - Auto PR

For supported finding types, Varydn opens a pull request with the fix applied. The developer reviews, approves, and merges - security stays in the workflow.

Capabilities

More Than a Suggestion Engine

Context-Aware Fixes

Remediation suggestions are generated against the actual code, not generic templates. The language, framework, and surrounding context are all considered.

Auto-Generated Pull Requests

For dependency upgrades, weak crypto replacement, and common pattern fixes, Varydn can open a ready-to-merge PR automatically.

Prioritization by Risk

Not all findings are equal. Varydn surfaces the highest-risk items first, with business context, exploitability, exposure, and blast radius factored in.

Tracked Resolution

Every finding has a lifecycle: open → acknowledged → in-remediation → resolved. The state is tracked, timestamped, and exportable for compliance purposes.

Exception Management

When a finding cannot be immediately remediated, teams can apply a documented exception with an expiration date, maintaining audit compliance while managing risk.

CRITICAL Hardcoded private key
Open
infra/deploy/secrets.tf:22

Private RSA key committed directly to Terraform configuration. Rotate immediately and use a secrets manager reference.

MEDIUM lodash < 4.17.21
PR Opened
package.json - CVE-2021-23337

Prototype pollution vulnerability. Auto-generated PR #249 upgrades lodash to 4.17.21.

Turn Findings Into Fixes Automatically

Request a demo and see how Varydn Remediation reduces mean-time-to-fix across your entire codebase.