AWS' CodeGuru Reviewer updated to tackle Log4j
Amazon's code reviewer also now includes a library detailing every detector used by the platform

Amazon Web Services (AWS) has added two new capabilities to its developer tool CodeGuru Reviewer, including checks against the Log4j vulnerability.
The machine learning service helps uncover security vulnerabilities in code while also offering suggestions for improving code quality.
RELATED RESOURCE
Seven leading machine learning use cases
Seven ways machine learning solves business problems
Building on these capabilities, AWS’ CodeGuru Reviewer now supports two new features: detector library and security detectors for log-injection flaws.
The detector library contains a detailed description of detectors used by CodeGuru Reviewer when searching for possible defects. Additionally, the library offers code samples in both Java and Python.
For each detector, CodeGuru Reviewer includes one noncompliant and one compliant code instance. The detectors are designed to pick up on a wide range of code defects.
In addition, CodeGuru employs machine learning and automated reasoning to identify potential errors. The result is that each detector can find additional defects on top of the one explicitly listed on its description page.
Secondly, new detectors for log-injection flaws address the problem described in CWE-117: Improper Output Neutralization for Logs. In particular, the new capability mitigates a recently discovered vulnerability in Apache Log4j.
Get the ITPro daily newsletter
Sign up today and you will receive a free copy of our Future Focus 2025 report - the leading guidance on AI, cybersecurity and other IT challenges as per 700+ senior executives
“Following the recent Apache Log4j vulnerability, we introduced in CodeGuru Reviewer new detectors that check if you’re logging anything that is not sanitized and possibly executable,” explained AWS.
“Following these detectors, user-provided inputs must be sanitized before they are logged. This avoids having an attacker be able to use this input to break the integrity of your logs, forge log entries, or bypass log monitors.”
Detector library and new detectors for log-injection flaws are available across all AWS regions that offer Amazon CodeGuru Reviewer.
-
AI is helping bad bots take over the internet
News Automated bot traffic has surpassed human activity for the first time in a decade, according to Imperva
By Bobby Hellard
-
Two years on from its Series B round, Hack the Box is targeting further growth
News Hack the Box has grown significantly in the last two years, and it shows no signs of slowing down
By Ross Kelly
-
Hackers are targeting Ivanti VPN users again – here’s what you need to know
News Ivanti has re-patched a security flaw in its Connect Secure VPN appliances that's been exploited by a China-linked espionage group since at least the middle of March.
By Emma Woollacott
-
Broadcom issues urgent alert over three VMware zero-days
News The firm says it has information to suggest all three are being exploited in the wild
By Solomon Klappholz
-
Nakivo backup flaw still present on some systems months after firms’ ‘silent patch’, researchers claim
News Over 200 vulnerable Nakivo backup instances have been identified months after the firm silently patched a security flaw.
By Solomon Klappholz
-
Everything you need to know about the Microsoft Power Pages vulnerability
News A severe Microsoft Power Pages vulnerability has been fixed after cyber criminals were found to have been exploiting unpatched systems in the wild.
By Solomon Klappholz
-
Vulnerability management complexity is leaving enterprises at serious risk
News Fragmented data and siloed processes mean remediation is taking too long
By Emma Woollacott
-
A critical Ivanti flaw is being exploited in the wild – here’s what you need to know
News Cyber criminals are actively exploiting a critical RCE flaw affecting Ivanti Connect Secure appliances
By Solomon Klappholz
-
Researchers claim an AMD security flaw could let hackers access encrypted data
News Using only a $10 test rig, researchers were able to pull off the badRAM attack
By Solomon Klappholz
-
A journey to cyber resilience
whitepaper DORA: Ushering in a new era of cyber security
By ITPro