Security

Enterprise-Grade Security for COBOL Modernization

Multi-layered protection at every stage of the translation pipeline. From invisible Unicode threats to supply chain attacks — we defend your most critical code with the rigor it deserves.

30+
Unicode categories scanned
0
Third-party code in pipeline
100%
On-premise deployable
5
Compliance frameworks
Input Protection

Every Input Scanned. Every Threat Blocked.

Before any COBOL source touches our translation engine, it passes through four layers of input validation designed to catch everything from invisible Unicode exploits to embedded credentials.

Invisible Unicode Scanning

We scan for 30+ categories of invisible and confusable Unicode characters — zero-width joiners, bidirectional overrides, homoglyph attacks, and Trojan Source exploits. If it's not visible in your editor, we'll catch it.

Prompt Injection Detection

Multi-layer detection for prompt injection attempts embedded in COBOL source, comments, or copybooks. Pattern matching plus semantic analysis ensures adversarial inputs never reach the AI model.

PII & Credential Scanning

Automatic detection of hardcoded passwords, API keys, Social Security numbers, credit card numbers, and other sensitive data in source files. Flagged before translation begins.

File Size & Complexity Limits

Configurable guardrails prevent denial-of-service through oversized inputs or pathological COBOL structures. Complexity scoring ensures the engine operates within safe bounds.

$ cobol2now scan --input PAYROLL.cbl
✓ Unicode scan passed — 0 invisible characters
✓ Prompt injection scan — no injections detected
⚠ PII detected — line 847: hardcoded SSN pattern
✓ Complexity within limits — score: 72/100
→ 1 warning. Review required before translation.
Output Validation

Every Output Verified. Every Risk Caught.

AI-generated code doesn't ship until it passes four independent validation gates. No dangerous patterns. No compilation errors. No business logic drift.

Dangerous Code Pattern Blocking

Static analysis scans translated output for dangerous patterns — System.exit(), Runtime.exec(), file system access outside sandbox, network calls, and reflection-based exploits. Blocked before delivery.

Compilation Verification

Every translated Java file is compiled with javac in a sandboxed environment. If it doesn't compile cleanly, it doesn't ship. Zero tolerance for syntax errors or unresolved dependencies.

Business Logic Preservation Scoring

Automated scoring compares the semantic behavior of translated code against the original COBOL. Control flow, arithmetic precision, and edge cases are all validated against known-good outputs.

NVIDIA NeMo Guardrails

Integrated NeMo Guardrails provide an additional AI-native safety layer — constraining model outputs to approved patterns and preventing hallucinated code constructs from reaching production.

Supply Chain Security

Trusted Code. Auditable Pipeline.

The translation pipeline contains zero third-party code. Every dependency is audited, every commit is scanned, and the full pipeline is open to client security review.

Audited Dependencies

All dependencies are audited and lockfile-verified. No phantom packages, no typosquatting risk. SBOM (Software Bill of Materials) available for every release.

Pre-Commit Unicode Hooks

Git pre-commit hooks scan every code change for invisible Unicode characters before it enters the repository. The same scanner that protects your code protects ours.

Zero Third-Party Translation Code

The core translation pipeline is 100% first-party code. No third-party libraries participate in the COBOL-to-Java translation path. Minimal attack surface by design.

Open-Source Scanner for Client Audit

Our Unicode and input security scanner is available as open-source for client security teams to audit, extend, and integrate into their own CI/CD pipelines.

On-Premise Deployment

Your Code Never Leaves Your Network

COBOL2Now deploys directly into your infrastructure — no cloud dependencies, no data exfiltration risk, complete operational control.

Source Code Stays Local

Your COBOL source code never leaves your network perimeter. Processing happens entirely on your hardware.

Air-Gapped Operation

Full support for air-gapped environments. No internet connectivity required for translation or validation.

No Telemetry

Zero telemetry, zero data collection, zero phone-home. The engine operates silently within your infrastructure.

Full Audit Trail

Every translation, validation, and decision is logged locally. Complete traceability for compliance and forensics.

Deployment Architecture

Your Network
├─ COBOL Source Files
├─ COBOL2Now Engine
├─ AI Translation Model
├─ Validation Pipeline
└─ Audit Log Store
No external connections
No cloud dependencies
No data exfiltration
External Network
├─ Cloud APIs
├─ Third-party services
├─ Telemetry endpoints
└─ Training pipelines
Compliance Ready

Built for Regulated Industries

COBOL2Now's architecture maps directly to the controls your auditors expect. We don't bolt on compliance — we design for it.

SOC 2 Type II
Aligned controls
NIST 800-53
Full control mapping
PCI-DSS
Compatible architecture
SOX
Audit support & traceability
FedRAMP
Pathway documented
HIPAA / GLBA
Data isolation compliant

What This Means for Your Audit

Complete audit trail for every translation decision
No data leaves your compliance boundary
Role-based access control for translation pipeline
Immutable logging for SOX and regulatory review
Documented control mappings for auditor review
Security whitepaper available under NDA
Get Started

Security You Can Verify

We believe in transparent security. Download our whitepaper for the full technical details, or schedule a review with our security team.

Questions? Reach out to security@cobol2now.com