Cloud security platform Wiz has introduced WizExtend, a browser-based extension designed to embed cloud security insights directly into the tools where engineering and security teams already work.
The release targets a persistent operational gap in enterprise cloud environments: security findings often live in centralized dashboards, while infrastructure changes are made in cloud consoles, code repositories, and developer tools.
WizExtend overlays contextual security data on top of major cloud service provider consoles such as AWS, Azure, and Google Cloud, as well as version control systems including GitHub and GitLab. Rather than requiring engineers to pivot between multiple platforms, the extension surfaces relevant risks in a side panel tied to the specific resource or code currently in view. For example, when an engineer is inspecting an EC2 instance or S3 bucket, WizExtend automatically displays associated misconfigurations, exposures, or vulnerabilities linked to that resource.
This in-context approach is designed to reduce investigation latency. By aligning security data with the precise infrastructure or code artifact being modified, teams can triage issues faster and with greater accuracy. WizExtend also integrates MikaAI, Wiz’s AI assistant, which can answer targeted questions using the live context of the resource being viewed. Queries such as recent access patterns or unpatched software can be resolved without navigating away from the cloud console or repository.
A core capability of WizExtend is bidirectional traceability between runtime cloud resources and infrastructure-as-code. From a cloud console, engineers can trace a misconfigured resource back to the exact IaC file and line of code that created it. From within a repository, they can see the live security posture of the resource defined in code, including whether it is currently exposed in production. This connection addresses a common challenge in cloud environments where ownership and responsibility are split between platform, infrastructure, and application teams.
WizExtend also supports remediation workflows directly within development tools. When working in GitHub or GitLab, developers can view CVEs, exposed secrets, static analysis findings, and IaC misconfigurations relevant to code they own or authored. The extension can guide developers to the precise fix, identify required patched versions, or automatically generate a pull request with a proposed remediation. This capability is intended to improve time-to-fix while reducing noise from findings unrelated to a developer’s scope of responsibility.
Beyond internal tooling, WizExtend extends security analysis into external research workflows. When users view public CVE advisories, such as entries from the NIST National Vulnerability Database, the extension can assess whether the vulnerability applies to the organization’s live cloud environment. The result is an immediate, asset-specific answer that links external threat intelligence to internal exposure, supported by the Wiz Security Graph.
WizExtend reflects a broader shift in enterprise cloud security toward embedding controls and insights directly into engineering workflows. As organizations scale cloud usage and decentralize infrastructure ownership, tools that reduce friction between security governance and delivery velocity are becoming increasingly critical.