Website building platform https://www.wix.com/about/us recently created a simple but effective logic-based monitoring process that detects application-level vulnerabilities in production-level environments in real-time. Wix’s custom security system detects security vulnerabilities by using logic that looks for the opposite of what’s expected from a secure application and searches for those exceptions in the application logs, according to a https://www.wix.engineering/post/threat-and-vulnerability-hunting-with-application-server-error-logs written by Wix Security Engineer https://www.linkedin.com/in/moti-harmats-b232aa98/ Once a security exception is found in an application log, a member of the security team is notified and the threat is addressed.
Wix already had security processes in place including shift-left, and production-level processes that focused on the runtime environment (server/ OS) and perimeter (WAF/ HTTP access logs).
Wix found reverse engineering application vulnerabilities and monitoring server logs at scale was an incredibly valuable process for their applications as they found a security solution that works at scale.