Skip to main content
Skip table of contents

Zero-Day Management in the Mend AppSec Platform

Overview

A Zero‑Day event is a newly disclosed, high‑risk vulnerability which is identified and actively tracked in the Mend AppSec Platform.

During an active Zero‑Day:

  • Mend.io immediately surfaces the risk in the UI.

  • You can investigate impact across your applications and projects.

  • You can enforce policies using workflows and violations (coming soon).

This page explains how the Mend AppSec Platform helps you respond to Zero‑Day vulnerabilities, and what you can actively do in the product when such an event occurs.

Note: Mend.io may use the Zero-Day feature to alert on vulnerabilities that are not technically zero-days (e.g., CanisterWorm Supply Chain Attack) but require similar mitigation steps.

The Zero-Day Banner

Mend.io will alert users to recent zero-day events with a banner towards the top of the platform UI.

image-20260403-062400.png

This banner is a hub for all zero-day related information and action.

On the left you will see the name of the zero-day event, followed by its impact on your organization’s inventory. Possible statuses include:

  • No exposure detected so far - stay alert.

    image-20260403-062157.png
  • Exposure was detected in your organization. Immediate action is required.

    image-20260403-062130.png

On the right side of the banner you have two notable buttons:

  1. The S-shaped button will direct you to the Workflows page, prefilled with recommended settings for creating an automation workflow that will help you mitigate the zero-day in your applications.

  2. The rightmost button will spawn the Actions menu, allowing you to perform the following actions:

    1. View Zero-Day Catalog: Navigate to the Zero-Day Catalog page which displays general information about zero-day events (not specific to your inventory).

    2. View Your Exposure: Navigate to the zero-day findings report that is relevant to your organization’s inventory.

    3. Learn More: Open this documentation page in a new browser tab.

    4. Hide Banner: Allows you to hide the banner. It will respawn when a new zero-day is detected.

image-20260403-062642.png

View Your Exposure

For Zero‑Day response, Mend.io correlates Zero‑Day information with your existing inventory.

  • Source of truth: Your existing inventory from previous scans.

  • Matching logic: A vulnerability is associated with your assets if:

    • MSC ID matches, or

    • Library name matches.

Click the red View Your Exposure button to navigate to the zero-day findings report that is relevant to your organization’s inventory.

Note:

  • No new scan is automatically triggered by the Zero‑Day event itself.

  • Mend.io uses what you have already scanned to determine impact.

Zero-Day Workflows

When a zero-day is detected in your inventory, it is recommended to take immeidate action to mitigate it. Mend.io helps you by offering prefilled automation workflows that will create a violation and fail the pipeline whenever a zero-day is detected in your inventory.

New Zero-Day Workflows (Recommended)

Note:

  • Once set up, “Zero-Day - New” workflows are triggered automatically for subsequent zero-day events. No scan or manual execution is required.

  • For existing zero-day events (active during the workflow setup), a rescan is required to apply the new workflow to existing inventory and display current exposure.

When a new zero-day event is in effect, enforcement measures need to be configured: Violations, Jira tickets, and notifications. These only become effective after a Zero-Day workflow is created.

Follow these steps to set it up:

  1. Navigate to Workflows → Create From Template

  2. Select the Zero-Day Event template

  3. The workflow is prefilled as follows:

    1. Triggering Event: Security - Dependencies Analysis

    2. Scope: Entire Organization

    3. Event Conditions (When):

      1. Zero-Day - New (Auto Triggering)

      2. Less Than or Equals - 7 days

    4. Actions: Create Violation

    5. Actions Settings - Violations:

      1. Priority: Critical

      2. SLA: 1 day

      3. Fail Pipeline on Violation: Enabled

  4. Click Create.

image-20260413-160704.png

Workflows for Specific Zero-Days

You have the option to create workflows for specific zero-day events, including inactive ones.

The default workflow settings for mitigating the zero-day are:

  • Triggering Event: Security - Dependencies Analysis

  • Scope: Entire Organization

  • Event Conditions (When):

    • Zero-Day Event

    • Add the desired zero-day events to monitor

  • Actions: Create Violation

  • Actions Settings - Violations:

    • Priority: Critical

    • SLA: 1 day

    • Fail Pipeline on Violation: Enabled

image-20260403-065939.png

You can change the settings to match your organization’s policy.

Click Create when you’re ready to apply the workflow.

Zero-Day Reporting

  • The Applications/Projects views can be filtered by specific zero-day events impacting them.

    • Click the filter after adding it to select the desired zero-day events.

      image-20260413-180451.png
  • The Dependencies Findings report can be configured to include specific zero-day event findings.

    image-20260413-181512.png
  • The Zero-Day Catalog is available as a standalone report.

Zero‑Day Catalog

The Mend AppSec Platform provides a dedicated Zero‑Day Catalog, available via your Profile menu. It’s designed as a live, authoritative source of Zero‑Day information. It is independent of your inventory: You can see Mend.io’s Zero‑Day data even before or beyond your specific scans.

image-20260403-063940.png

The most recent active Zero‑Day will be selected by default. You can use the drop-down menu at the top to switch between Active Zero‑Days and Historical ones (which remain visible indefinitely).

image-20260403-065115.png

The catalog displays a live table of Zero‑Day entries. Available columns include:

  • Library: The library name

  • SHA‑1: The SHA-1 value of the library

  • Finding: The vulnerability ID

  • Data Added: The date the library was added to this zero-day event after being identified by Mend.io.

  • Zero-Day Name: This column can be added via the Columns menu on the right.

Export Zero-Day Data

You can sort and filter the table as well as export the data in CSV or JSON format (using the Export button at the top-right), to support internal reporting or audits.

This replaces static spreadsheets with a live, UI‑based and API‑backed view.

The Zero-Day Catalog is also available in Reports.

image-20260413-180947.png

API Access

In addition to the platform UI, you can access zero-day data programmatically using the Mend API 3.0. The following endpoints are available:

Zero-Day Catalog APIs

These are general findings that are unrelated to your inventory. Results may change over time, especially during an active zero-day event.

  • Get all Zero-Day Events: Returns all the zero-day events currently registered in the platform.

  • Get Affected Packages for a Zero-Day Event: Returns a list of all packages affected by the specified zero-day event.

Visit the Zero-Day Catalog API documentation for more details.

Your Exposure APIs

Project

Use the project findings APIs with the zeroDayIdentifier query parameter (followed by the zero-day event’s UUID or name) to filter project findings that are related to the specified zero-day event.

Organization/Application

Zero-day data is available in the Dependencies Findings report.

Zero‑Day Lifecycle and TTL

Each Zero‑Day progresses through two main phases in Mend:

Active phase (Days 0–30 after publication)

image-20260323-112837.png

During the active phase:

  • Awareness and violation banners are displayed where relevant.

  • The Zero‑Day Catalog page shows status = Active

  • Inventory correlation is active (based on existing scans).

Expired phase (after Day 30)

image-20260323-113047.png

After 30 days:

  • All Zero‑Day banners are removed from the UI.

  • The Zero‑Day is no longer considered active.

  • The Zero‑Day Catalog page shows status = Expired

JavaScript errors detected

Please note, these errors can depend on your browser setup.

If this problem persists, please contact our support.