Reachability Analysis: Evolving from Package-Level to Function-Level 

by Ali Naqvi

Software development today is significantly different from what it was a few years ago. More open-source packages are being embedded in code today than ever before. In their 2024 Open-Source Security and Risk Analysis Report, Blackduck states, "Seventy-seven percent of all code in the codebases originated from open source. Every industry codebase scanned contained open source—most at percentages from 99% to 100%." Open-source third-party libraries and dependency packages significantly speed up development through contributions from the open-source community. Third-party libraries and dependency packages come with their challenges. A threat actor can create an exploit to compromise a dependency package. This could compromise any software built using these dependency packages. This is where reachability scans by vulnerability scanners started to gain popularity. When reachability scanning first became popular, it was rudimentary. Most scanning tools would investigate your application code and determine whether the vulnerable package was imported anywhere in the application.

This approach is better than not doing a reachability scan, although it yields many false positives. From 2010 to 2020, scanners focused on context-aware scanning at the package level, which helped security analysts better understand the reachability of a vulnerable dependency package. For example, suppose a security analyst conducts a package-level reachability scan for the widespread Log4Shell vulnerability in the Apache Log4j 2 package (CVE-2021-44228). In that case, the scanner will flag the Log4j package as vulnerable, even if it has not been used in the application code. This made the vulnerability seem more significant in many instances than it was. Many applications may include Log4j as a nested dependency without invoking the specific JndiLookup class or configurations required to exploit Log4Shell.

In the last couple of years, function-level reachability has become a critical feature for security analysts in their application scanners. Function-level scanners provide deeper analysis when they scan dependency packages. Rather than scanning for vulnerabilities at a package level and generating numerous alerts for using a vulnerable package, the scanner now identifies vulnerabilities at a function level. This is a shift in scanning from a reactive "scan and detect everything" approach to a more proactive-focused approach. If the scan were a function-level reachability scan for the Log4Shell vulnerability, it would determine how the Log4j library was used within the application code. The scan can analyze and see if the JndiLookup functionality is exploitable and assess whether it is in vulnerable paths. This gives a more accurate analysis of the Log4j package being vulnerable, reducing false positives. This detailed analysis will help security analysts prioritize and allocate resources effectively to remediate the vulnerability. Security analysts can decide whether to update the dependency package to the next non-vulnerable dependency package or accept the risk and continue utilizing the same dependency package.


Although function-level dependency is a big step forward for application security analysis, it is not a silver bullet. It still comes with several challenges. Analyzing function-level reachability for a complex application requires the scanning tool to traverse multiple layers of dependency packages that are deeply nested by calling packages that rely on other dependency packages. This can impact the overall speed at which the security analyst can identify risks in their organizations. Another major challenge is that function-level scanning, although better than package-level scanning, can still have false positives (flagging non-exploitable functions) and false negatives (not detecting exploitable paths). Function-level reachability analysis is also programming language-dependent. Most scanners support a limited number of programming languages. There is usually support for popular languages like Java, JavaScript, and Python. Other languages like Golang, Rust, and Perl are generally unsupported. Finally, the last drawback of function-level analysis is the difficulty of tracing code that has been obfuscated for security purposes. This forces scanners to try and make an educated guess on what functions will be vulnerable or just default back to a package-level analysis.

In conclusion, you must scan your application for security vulnerabilities as a security analyst. If you are budget-conscious and have the resources, you can use open-source scanners to perform package-level scanning, which will get you a step further than not scanning at all. The best option today is to get a function-level scanner for reachability. Function-level reachability provides a more detailed analysis of dependency packages that the security analyst should use. This analysis reduces noise by examining the function to determine if the function is exploitable. It also increases efficiency by reducing the number of alerts generated and false positives, allowing you to spend less time triaging and more on remediation. This is particularly important for mid-to-large organizations, where developers and security teams already face a heavy workload.

shaun of the dead scene where the 2 main characters are sitting on couch watching tv
December 16, 2024
Shift-Left isn’t dead—it’s just leveling up with AI. By blending AI with Shift-Left, developers get real-time security insights, fixing flaws faster while AI handles the heavy lifting.
forrest gump waits with a box of chocolates
December 3, 2024
Runtime reachability truly transforms the way we manage vulnerabilities in open-source and third-party dependencies. By identifying which flagged vulnerabilities are actually exploitable in production, this approach helps us reduce false positives.
2 men in car looking strangely at you
November 26, 2024
This blog explores why large language models (LLMs) hallucinate—generating plausible but false information—and highlights strategies like RAG, fine-tuning, and prompt engineering to improve AI reliability in critical fields.
Neon graphic world interconnected across a network
November 19, 2024
Retrieval-Augmented Generation (RAG) combines generative AI with external knowledge retrieval, enabling more accurate and contextually rich outputs. It is ideal for applications needing real-time updates or domain-specific data but faces challenges in latency and data security. Advances like Graph-RAG and tools like LangChain are shaping its future use in diverse fields.
AI in the form of a human brain
November 12, 2024
Unlock the full potential of AI with fine-tuning—where pre-trained models are customized to excel in tasks like code generation, application security, and more. By conquering challenges with smart techniques like PEFT and quantization, fine-tuning transforms AI into a powerful, domain-specific problem solver.
Buzz Lightyear with the pizza store aliens
October 29, 2024
This blog explores how application security evolved from manual methods to AI-powered defenses, using techniques like RAG, AI agents, and predictive modeling to create adaptive, real-time threat protection for the future.
Person laying on ground short of a race finish line
October 22, 2024
Organizations are struggling to keep up with application vulnerability remediation due to the complexity of modern development practices. This blog explores the shortcomings of current remediation efforts and offers insight into new strategies that can help streamline the process.
The Nightman Cometh - It's Always Sunny in Philadelphia
October 8, 2024
The final chapter of the Turbulent Marriage trilogy, gives readers a solution that will bridge the communication gap between developers and security analysts, allowing them to live happily ever after.
Eye of Sauron
September 24, 2024
A day in the life of a security analyst and their struggle between keeping the company safe from attacks and sending out false positives to developers that could take them away from producing code.
John Wick
September 17, 2024
A day in the life of a developer and their struggle between producing new code and keeping up with vulnerabilities being sent to them by the security team.
Show More