Pre-Push Development Environment Security

Ship Fast. Ship Secure. DevGuard Catches Risk Before Push.

Pentesterra DevGuard performs a comprehensive security audit of your development environment before code reaches production - supply chain vulnerabilities, exposed secrets, AI toolchain risks, and cryptographic weaknesses, all detected locally and analyzed in the cloud.

No source code uploaded. No resident agents. Privacy-first by design.

See DevGuard in Action

Watch how DevGuard protects your development environment in real-time.

How Pentesterra DevGuard Works

Security analysis before your code even reaches the repository.

01

Developer runs DevGuard locally

The CLI or IDE plugin starts a full local project security analysis.

02

Local secure telemetry collection

DevGuard collects only required security telemetry - no source code and no raw secrets are sent.

03

Pentesterra cloud analysis

Pentesterra correlates risks, analyzes dependencies and AI toolchains, and builds an actionable security score.

04

Results everywhere

Results are available across CLI, VS Code/Cursor/Windsurf plugins, and the Pentesterra Web Portal.

Privacy-First Security

DevGuard is designed to work without requiring source code transfer.

Source code is not transferredSecrets are not transferredKeys are masked locallyOnly safe telemetry reaches the cloud

Pentesterra DevGuard masks sensitive data and keeps only a short key prefix so developers can quickly locate the source in code. The client is fully transparent and can be reviewed by users.

AI Writes Code Faster Than Security Can Review It

Modern development moves fast. Security often arrives too late.

The Reality
  • AI-generated code ships with vulnerable dependencies
  • Hardcoded secrets reach remote repositories
  • Malicious packages enter supply chains through typosquats
  • MCP and AI IDE tools introduce novel attack vectors
  • Crypto misconfigurations bypass standard reviews
  • Peer dependency conflicts cause silent runtime crashes
  • Deprecated APIs in packages break on framework upgrades
  • LLM gateway keys exposed in agent configuration files
  • PHP and CMS platforms deployed with insecure defaults
  • Business logic flaws go undetected until exploitation
  • Malicious packages persist via .pth hooks, stealing cloud credentials on every Python start
  • GitHub projects silently exfiltrate your LLM API keys via custom SDK proxy (base_url redirect)
  • External services accumulate invisibly - forgotten Firebase without auth, n8n without encryption, unencrypted DB connections
With DevGuard
  • Every dependency mapped to CVE/KEV before push
  • Secrets detected and masked - never transmitted
  • Known malicious packages blocked at development stage
  • AI toolchain configurations validated against threat intel
  • LLM-assisted crypto analysis with compliance mapping
  • Peer dependency conflicts flagged with semver analysis
  • Deprecated APIs detected across all npm dependencies
  • LLM gateway keys and insecure agentic patterns surfaced
  • Go, PHP, and CMS misconfigurations caught before deploy
  • Logic vulnerabilities detected from structural metadata alone
  • Python .pth execution hooks and credential harvesting in installed packages detected before push
  • Credential exfiltration via SDK proxy redirect, HTTP calls, and subprocess detected pre-push
  • Full service dependency map shows every external connection, protocol, TLS status, and risk

Three Steps. Zero Friction.

From install to actionable findings in under two minutes.

01

Install & Initialize

Single command install via pip. Initialize your project with pentestera-devguard init - links your local environment to the Pentesterra cloud console.

02

Local Collection

A thin local collector inventories dependencies, secrets, configurations, IDE extensions, AI toolchains, and credential surfaces. Only redacted metadata leaves your machine.

03

Cloud Analysis & Actionable Results

Pentesterra's cloud engine runs a 3-pass analysis - CPE matching, advisory correlation, and LLM-powered contextual assessment. Results available in CLI, IDE sidebar, and web console.

Security for the Modern Developer Environment

Modern attacks increasingly target development environments, not only production systems. DevGuard protects IDE extensions, AI coding toolchains, MCP servers, development runtimes, and local secrets before code reaches your repository or CI/CD.

35 Risk Modules. One Unified Scan.

DevGuard covers the modern development surface - from package lockfiles and AI IDE configurations to Go, PHP, CMS platforms, and LLM integration security.

Supply Chain & Dependency Analysis

15 lockfile parsers across npm, PyPI, Go, Rust, Ruby, PHP, Java, .NET, Swift, and Dart. Every dependency mapped against CVE, KEV, and exploit availability databases.

Secrets & Credential Detection

Pattern-based detection for AWS keys, OAuth tokens, JWT secrets, private keys, database credentials, and more. Privacy-first: only metadata and masked fingerprints are transmitted.

AI Toolchain & MCP Risk

Detects malicious MCP server configurations, suspicious AI IDE plugin patterns, and known exfiltration vectors across Cursor, Windsurf, VS Code, JetBrains, and more.

Known Malicious Packages

Cross-referenced against a curated database of 50+ confirmed malicious packages - supply chain attacks, protestware, typosquats, and dependency confusion vectors.

Cloud & Credential Surface

Inspects AWS, GCP, Azure, Terraform, and Kubernetes configurations. Detects SSH key exposure, Docker registry auth tokens, and OS credential stores across platforms.

Crypto & TLS Weakness Analysis

Detects deprecated TLS/SSL versions, weak ciphers, broken hash algorithms, insecure key sizes, and deprecated crypto libraries. LLM-powered contextual analysis reduces false positives.

Peer Dependency Conflicts

Parses peerDependencies from every installed npm package and validates against actual versions. Catches React 19 incompatibilities, missing required peers, and major version mismatches before they cause runtime crashes.

Deprecated API Detection

Scans dependency entry points for removed React 19 lifecycle methods (UNSAFE_componentWillMount), legacy ReactDOM.render, deprecated Node.js Buffer constructors, and obsolete built-in modules - before they break in production.

NEW

Business Process Detection

Automatically identifies business processes from structural metadata - package names, directory paths, env vars, ORM class names, OpenAPI paths. No source code transmitted. Outputs BP-IDs (BP-PAY-001, BP-AUTH-001...) with regulatory scope mapping (PCI-DSS, GDPR, HIPAA, SOX).

NEW

Logic Risk Detection

Detects 7 classes of application logic vulnerabilities: Missing Authorization, IDOR, Bypassable Workflow, Unverified State Transitions, Privileged Op Exposed, Race Conditions, Mass Assignment. Composite risk scoring 0–10.

Endpoint & Auth Map

Extracts HTTP routes with authentication/authorization status from FastAPI, Flask, Django, Express, NestJS, Next.js, Rails, Spring. Identifies unprotected sensitive endpoints without transmitting source code.

Data Asset Classification

Field-level ORM model extraction across 10+ ORMs (SQLAlchemy, Django, Prisma, TypeORM, Sequelize, Mongoose, GORM, ActiveRecord). Classifies data assets: financial, identity, PII, health, credential. Maps regulatory scope automatically.

Business Impact Report

9-section structured report linking attack vectors to business processes. Executive summary, compliance impact (PCI-DSS/GDPR/HIPAA/SOX), prioritized remediation plan sorted by severity and effort. Integrates with Pentesterra attack chain analysis.

NEW

SAST Lite - Static Analysis

Regex-based static analysis across Python and JavaScript/TypeScript source files. Detects SQL injection, XSS, command injection, SSRF, insecure deserialization, prototype pollution, and prompt injection. Privacy-first: only file path, line number, and a short snippet hash are transmitted - no source code sent.

NEW

Automation Platform Risk

Detects insecure configurations in n8n, Zapier, Make, and IFTTT workflows. Identifies dangerous execution nodes (Execute Command, Code Node), missing authentication on webhook triggers, unencrypted workflow storage, and CVE-mapped versions of automation platforms.

NEW

AI Agent Configuration Risk

Scans agent frameworks for dangerous tool exposure (ShellTool, BashTool, PythonREPLTool), unsafe prompt construction patterns, persistent memory storage risks, and unvalidated input flows in Python, TypeScript, and YAML agent definitions.

NEW

Vector DB Exposure

Identifies exposed vector database credentials and unauthenticated endpoints. Detects API keys for Pinecone, Weaviate, Qdrant, and OpenSearch in source files and environment configs. Flags Docker Compose services exposing ChromaDB, Qdrant, and Weaviate without authentication.

NEW

IDE Plugin Threat Intelligence

Cross-references your installed VS Code, Cursor, Windsurf, JetBrains, and Zed extensions against a threat intelligence database of malicious and typosquatted extensions. Detects AI agent plugins with excessive permissions and extensions reported in security advisories.

NEW

Go Security

Detects Go-specific security issues: InsecureSkipVerify in TLS configs, pprof profiler endpoints exposed without auth, math/rand used for security operations, SQL injection via fmt.Sprintf, HTTP servers without TLS. Full route enumeration for Gin, Echo, Chi, Fiber, and net/http.

NEW

PHP & CMS Security

Analyzes PHP.ini settings, Laravel .env files, and dangerous function usage (eval, exec, shell_exec, unserialize with user input). CMS coverage: WordPress plugin inventory, debug mode, xmlrpc.php exposure; Drupal, Joomla, Magento 2, and PrestaShop configuration risks.

NEW

LLM Integration & Prompt Injection Risk

Detects LLM gateway API key exposure (LiteLLM, OpenRouter, Portkey, Helicone), insecure agentic loops (while-true + LLM call without guards), LLM output piped to exec/subprocess (RCE chain), missing guardrails library, and multi-agent trust boundary violations where agent output is used as trusted tool input.

NEW

Python Runtime Execution Hook Detection

Detects supply-chain persistence and credential harvesting in installed Python packages - the class of attack used in litellm 1.82.8. Three layers: (1) .pth files with executable code in site-packages auto-executed at every Python startup; (2) installed packages reading cloud credential env vars (AWS, GCP, Azure, GitHub, OpenAI) combined with outbound network calls in the same file; (3) subprocess/os.system at module level in __init__.py. Cross-references with .env to confirm active attack surface.

NEW

Service Dependency Map

Maps every external service your project connects to: databases, LLMs, queues, object storage, auth providers, monitoring, and automation platforms. Extracted from connection strings, SDK imports, Docker Compose, and config files. Surfaces unencrypted connections, hardcoded credentials in URIs, unauthenticated endpoints, and forgotten services - like Firebase without auth or n8n without an encryption key left from the MVP phase. Available on the free tier in CLI output, IDE plugin sidebar, and web console.

NEW

Credential Flow Analysis

Traces how detected API keys and secrets are actually used in code - and whether they are being exfiltrated. Catches the most dangerous supply-chain attack: a GitHub project that works correctly but routes all LLM SDK calls through an attacker-controlled proxy via a custom base_url, silently collecting your key and every prompt. Also detects credential variables near HTTP calls to unexpected domains, subprocess curl exfiltration, credentials forwarded via webhooks, MCP servers configured with credential env vars, base64-encoded exfiltration, credentials in log statements, and secrets passed to unverified GitHub Actions.

NEW

API Route Security Analysis

Full API endpoint inventory with authentication coverage analysis across Flask, FastAPI, Django, Express, NestJS, Gin, Echo, and Chi. Detects unprotected routes, auth regressions, and missing authorization. Includes BOLA/IDOR surface detection (OWASP API Top 10 #1) - identifies authenticated endpoints that accept resource IDs without apparent ownership verification. Pre-push route diff blocks commits that introduce unprotected critical endpoints or remove authentication from existing routes.

NEW

GraphQL Security Analysis

Detects GraphQL APIs across SDL schema files, Graphene, Strawberry, Apollo, and Nexus codebases. Identifies unauthenticated mutations and sensitive queries, missing authorization decorators on resolvers, and introspection endpoints left open in production. Tracks auth coverage per operation type (query / mutation / subscription) without transmitting any source code.

Broad Ecosystem Coverage

Dependency parsing, IDE inventory, and runtime detection across modern stacks.

35 Scan Modules

15 lockfile parsers (npm, pip, Go, Rust, Ruby, PHP, Maven, NuGet, Swift, Dart), SAST Lite, Go & PHP & CMS security, LLM integration risk, AI agent configs, vector DB exposure, automation platform risk, service dependency map, credential flow analysis, and crypto weakness analysis - all in one unified scan.

9 IDE Families

VS Code, Cursor, Windsurf, JetBrains family, Zed, Neovim, Claude Code, Continue.dev, Cline - extension inventory with version tracking and advisory matching.

40+ Framework Signatures

WordPress, Django, Laravel, Next.js, Rails, Angular, React, Vue, Express, Flask, Spring - automatic detection with version CVE correlation.

Advisory Intelligence

Continuous feed from GitHub Advisory Database, OSV.dev, and VS Code Marketplace - enriched with LLM-classified security news from 6 industry sources.

Thin Agent. Powerful Cloud Engine.

DevGuard follows a strict thin-agent philosophy. The local CLI performs only data collection and privacy redaction. All intelligence - CVE mapping, advisory correlation, LLM analysis, risk scoring - runs in Pentesterra's controlled cloud infrastructure.

  • No intellectual property leaves your machine unredacted
  • Secret values are never transmitted - only type, path, and masked fingerprint
  • Payload inspection available via --dry-run before any data is sent
  • 3-pass analysis engine: CPE lookup, advisory matching, LLM contextual fallback
  • Re-analysis on new CVE data without rescanning
  • API key authentication with bcrypt hashing and prefix-based resolution

What Sets DevGuard Apart

Not another dependency scanner. A development environment security platform.

Privacy-First

No source code upload. Only metadata and redacted findings leave the developer machine.

IDE-Native

VS Code, Cursor, Windsurf extensions. Zero-setup: auto-installs CLI on first use, auto-updates, sidebar integration, scan-on-push hooks, and inline results.

Re-Analysis

When new CVEs are published, previously scanned projects are automatically re-evaluated - no rescan needed.

Pre-Push Gate

Git hook blocks push on critical findings. Configurable thresholds. CI/CD mode with exit codes.

How DevGuard Compares

CapabilityPentesterra DevGuardGitHub Advanced SecuritySnyk / SCA ToolsIDE Security Plugins
Pre-push local project analysispartial
Dependency vulnerability detectionpartial
Malicious package detectionpartial
Secrets detection before commitpartialpartialpartial
Source code sent to cloudpartialpartialpartial
IDE extensions security audit
AI / MCP toolchain analysis
Development environment security checkspartial
Automatic risk re-analysis for new CVEspartialpartial
Independent of Git hosting platformpartial
SAST without source code uploadpartial
Go / PHP / CMS platform security checkspartial
LLM integration & prompt injection risks
Business logic vulnerability detection
Python .pth execution hook & installed package credential harvesting
Credential flow analysis - proxy redirect, exfiltration, MCP exposure
Service dependency map - all external connections with TLS & protocol riskpartial

Integrated Into Your Workflow

CLI, IDE extension, and CI/CD - three surfaces, one consistent security posture.

CLI vs IDE Extension: What's the Difference?

The CLI is the core tool. It performs all security analysis and runs standalone in any terminal or CI/CD pipeline.

The IDE extension is zero-setup. On first use it automatically downloads and installs the CLI - no separate pip install required. It adds visual sidebar panels, scan-on-push file watchers, and inline results, and auto-updates itself (from Marketplace or our site). Choose CLI for terminal and CI/CD workflows; choose the extension for IDE integration with automatic updates.

CLI

Command Line

pip install, single-command scan. Supports --ci mode with configurable exit codes for pipeline integration. Local reports, dry-run inspection, and branch-aware scanning.

IDE

VS Code / Cursor / Windsurf

Native extension with sidebar panels. Auto-installs CLI on first use. Auto-updates from Marketplace or our site. Scan-on-push watcher and one-click pre-push hook installation.

WEB

Web Console

Full dashboard with project overview, scan history, findings grouped by risk category, severity trends, and API key management. Part of the Pentesterra platform.

Pre-Push Security Gate

DevGuard installs a git pre-push hook that runs a full security scan before code leaves your machine. Configurable severity thresholds - block on critical, high, or medium findings. CI/CD mode returns structured exit codes for pipeline enforcement. Bypass available with git push --no-verify when needed.

Block on critical findingsConfigurable thresholdsCI/CD exit codesBranch-aware scanning

Built for Modern Development Teams

AI-Era Developers

Cursor · Windsurf · Copilot · Cloud IDE

AI generates code fast - DevGuard validates its security posture before commit. MCP configurations, AI extensions, and generated dependencies all covered.

Startups & Small Teams

Developers without dedicated security

Free tier available. Zero infrastructure overhead. pip install and scan - enterprise-grade security intelligence without enterprise complexity.

DevSecOps & Security Teams

Security Engineers · AppSec · Platform Teams

Enforce pre-push policies, track supply chain risk across projects, and feed findings into the full Pentesterra vulnerability management pipeline.

From Development to Full-Cycle Security

DevGuard is your entry point into the Pentesterra platform.

01

DevGuard

Pre-push security audit. Supply chain, secrets, AI toolchain, and crypto risk - caught before code leaves the developer machine.

02

Web & API Pentest

Authenticated and unauthenticated testing of deployed applications. Evidence-based exploit validation with verification workflows.

03

Full-Cycle Platform

Network assessment, attack chain analysis, compliance mapping, and continuous verification - one platform covering the entire security lifecycle.

Tier 2 · Vibe Coding Pro - Extended Dev Security

Attack Chain Analysis

DevGuard findings feed directly into Pentesterra's Attack Chain engine. The platform correlates supply chain risks, exposed secrets, misconfigured containers, and vulnerable runtimes with network and web pentest data to compute realistic multi-step attack paths - showing exactly how an attacker could pivot from a compromised dependency to full infrastructure access.

Works with DevGuard data onlyChains across web + network + supply chainScored & prioritized attack pathsBusiness impact & compliance mapping

The output is a ranked list of attack chains with severity scores, affected assets, compliance gaps, and an AI-generated executive narrative - giving security teams and management a clear picture of exploitability before a real attacker finds it.

Who DevGuard Is Built For

AI-Driven Development

Projects built with Cursor, Copilot, or other AI tools need fast security feedback before deployment.

Startup Teams

Fast-moving teams can run security checks without maintaining a full DevSecOps pipeline.

Internal Development Environments

DevGuard helps secure internal services and development infrastructure.

Modern attacks target developers, not just production systems.

Pentesterra DevGuard detects security risks in the development environment before they reach your repository or your users.

Frequently Asked Questions

Does DevGuard upload my source code?

No. DevGuard follows a privacy-first architecture. Only metadata is transmitted: dependency names and versions, masked secret fingerprints (no actual values), misconfiguration patterns, and tech stack hints. Use --dry-run to inspect the exact payload before uploading.

How does DevGuard detect AI toolchain and MCP risks?

DevGuard scans IDE configuration files for malicious MCP server configs, suspicious AI plugin patterns, and known exfiltration vectors across Cursor, Windsurf, VS Code, and JetBrains. It also detects LLM gateway key exposure, insecure agentic loops, and prompt injection risk patterns.

What is Business Process Detection?

DevGuard identifies business processes from structural metadata - package names, directory paths, env vars, ORM class names, and API paths. No source code is transmitted. It outputs BP-IDs (e.g. BP-PAY-001, BP-AUTH-001) with regulatory scope mapping to PCI-DSS, GDPR, HIPAA, and SOX.

What happens when new CVEs are published after my last scan?

DevGuard includes automatic re-analysis. When new CVEs are published that match your previously scanned dependencies, your project is re-evaluated against the updated knowledge base - without requiring a new scan.

How does DevGuard integrate with CI/CD pipelines?

DevGuard CLI runs in any terminal environment and supports --json output for machine-readable results. Use the pre-push Git hook for local blocking, or integrate the CLI into GitHub Actions, GitLab CI, or any pipeline with configurable exit codes and fail thresholds.

Take Control of Your Attack Surface.

Start with the free tier or talk to us about your environment - network, web, cloud, or on-prem.