Detects Security Issues — and Fixes Them
Regularly scans all custom developments in your system. Detects SQL injection risks, missing authorization checks, sensitive data leak points, and risky coding patterns — and fixes them automatically.
Traditional security tools report; you fix. The VEX-HUB difference: detects the vulnerability, prepares the fix code, gets your approval, and applies it. Stay always ready for security audits.
What Does Security Scanning Offer?
Comprehensive Security Analysis
Scans all Z programs, function modules, classes, and enhancements against OWASP and SAP security standards.
Automated Remediation
Automatically prepares fix code for detected vulnerabilities. Applies the fix after your approval — no manual intervention required.
Continuous and Scheduled Scanning
Schedule security scans automatically — daily, weekly, or after each development. Newly added code is scanned automatically; security level stays under continuous control.
Audit Readiness
Stay always ready for internal and external audits with security scan results, remediation history, and current state reports. Compliance documentation is generated automatically.
How It Works
Scan
All custom developments are scanned against security standards.
Detection
Vulnerabilities are classified by severity.
Remediation
VEXCODER prepares the fix code and submits it for your approval.
Verification
A re-scan after the fix verifies closure of the issue.
Why Security Scanning?
Regularly scans all custom developments in your system. Detects SQL injection risks, missing authorization checks, sensitive data leak points, and risky coding patterns — and fixes them automatically.
Comprehensive Security Analysis
SQL injection and code injection detection
Automated Remediation
Automatic generation of fix code
Continuous and Scheduled Scanning
Automated scheduled scan cycle
Meet Security Scanning
VEX-HUB Security Scanning — try the live demo. Get up and running quickly with a configuration tailored to your SAP system.
