Top 10 security challenges in MuleSoft Projects

Here are some of the top security issues in Mule applications: 📌 Unsecured data storage: MuleSoft applications may store sensitive information in plain text or with weak encryption, which could result in data breaches. 📌 Inadequate access control: MuleSoft applications may have weak access control policies, which could allow unauthorized access to sensitive data. 📌 Insufficient logging and …

Mar 16

The Ultimate guide to Creating custom rules to validate Bitbucket repository with IZ Analyzer- Part 2

In the previous blog The Ultimate guide to Creating custom rules to validate Bitbucket repository with IZ Analyzer- Part1, we have already created a custom rule to validate if the repository is created in BitBucket. In this post, let us look at creating a custom AutoFix definition to create a new repository in BitBucket if …

Mar 10

The ultimate guide to Creating custom rules to validate Bitbucket repository with IZ Analyzer- Part 1

Overview IZ Analyzer is the most popular automated code quality analysis tool for MuleSoft and API (RAML and OAS) projects. It comes with over 200 pre-built rules aligned to industry best practices. In addition to the pre-built rules, project teams can define organization specific rules by using Custom Rules: one of our most exciting features. …


Integral Zone hosted a virtual MuleSoft meetup for the MuleSoft community

Topic 1: Transaction Management by Saurabh Vatsa Solution Architect at Integral Zone Topic 2: Code Quality Analysis by Hitesh Joshi, Senior MuleSoft Consultant at Integral Zone Watch full video: Meetup Slides: Quick knowledge hacks: All important articles archived below. C4E a.   Video series: Accelerating C4E adoption a.   Video 1: Introduction b.   Video 2: Accelerators c.    Video 3: Code review d.   Video 4: DevSecOps b.   All C4E-related archive IZ ANALYZER …

Jan 10
Business and Tech

MuleSoft Automated Code Quality Review – Why IZ Analyzer?

In the API driven integration ecosystem, Mulesoft™ is an industry leader. MuleSoft’s Anypoint Studio and Anypoint Platform offer rapid development speed, resulting in easy, fast, and scalable API development. It is indeed enterprising and more and more clients are leveraging MuleSoft for their iPass solutioning. With the speed of API development that MuleSoft offers, the …

Dec 20

Log4Shell and Kong Gateway

Log4Shell, what? Log4j2 shell CVE-2021-44228 has caught attention of many. If you are using Kong Gateway in your estate, you might be interested in this article. Is Kong Gateway Vulnerable? Simple answer is No Why? Kong gateway does not use Java. Hence there is no Log4J2. And there is no exploit that impacts Kong Gateway. …

Nov 22
Block Chain

XDC SmartLock – User Journey

XDC Smart Lock allow users to perform escrow services – to hold XDC centrally till all the smart triggering conditions have been fulfilled. In the current version, the triggering condition has been set to a time sensitive unlocking. XDC Smart Lock application utilizes alarm clock jobs triggerable through either Chainlink or Plugin oracles. Users can …


Choose the right Microservice pattern to make future-proof applications

Written by Saurabh Vatsa Organizations have been striving to develop applications that are agile and easy to adapt. Microservices architecture addresses this challenge and therefore created a buzz within the enterprise IT world. Despite the initial hype, many companies still struggle to find and implement the right microservices architecture. In this blog, we can see …

Jun 18

Mulesoft Development Fundamentals: Dataweave Best Practices

‘MuleSoft development fundamentals’ is a blog series that takes you through various aspects of MuleSoft development from “How to structure your Mule code” to “Things to cater to when you deploy to production”. We would love to share our expertise with the Community, having worked with several MuleSoft Enterprise clients. Please find all the blogs …