How Neo Solves This
When a developer opens a pull request on a connected repository, Neo automatically:- Analyzes the code changes — reads the diff, understands what was modified, and identifies security-relevant changes: new endpoints, authentication logic, input handling, data flows, and dependency updates.
- Correlates with the running application — connects the code changes to your staging or QA environment and tests whether the changes introduce exploitable vulnerabilities in the context of the full running application.
- Validates exploitability — attempts to exploit any potential vulnerabilities it identifies, capturing payloads, execution traces, and reproduction steps. Only validated findings are reported.
- Posts findings on the PR — comments directly on the pull request with full evidence: what was found, how it was exploited, the specific lines of code involved, and exactly how to fix it. The developer sees the findings in their normal review flow without switching tools.
- Retests when the fix is pushed — if the developer pushes a fix to the same PR, Neo automatically retests to confirm the vulnerability is resolved before the PR merges.
What This Looks Like in Practice
A developer opens a PR that adds a new search endpoint to your API. Neo detects the new endpoint, identifies that user input flows into a database query without parameterization, tests the running application to confirm the injection is exploitable, and posts a comment on the PR:What You Get
- Every PR reviewed for security — consistently, automatically, without depending on a security engineer’s availability
- Validated findings only — no static analysis noise, no theoretical alerts, only issues Neo confirmed are exploitable
- Findings in the developer’s workflow — posted directly on the PR where the developer is already working
- Automatic retesting — fixes are verified before merge, so resolved issues stay resolved
- Full evidence trail — every finding includes payloads, traces, and reproduction steps for audit and compliance
Setup
To enable PR security reviews:- Connect your GitHub repositories in Settings → Integrations → GitHub
- Add at least one application environment in Settings → Environments and link it to the relevant repository
- Enable automatic PR reviews in Settings → Automation → PR Reviews and select which repositories should trigger reviews

