Supply Chain & Dependency Analysis
15 lockfile parsers across npm, PyPI, Go, Rust, Ruby, PHP, Java, .NET, Swift, and Dart. Every dependency mapped against CVE, KEV, and exploit availability databases.
Secrets & Credential Detection
Pattern-based detection for AWS keys, OAuth tokens, JWT secrets, private keys, database credentials, and more. Privacy-first: only metadata and masked fingerprints are transmitted.
AI Toolchain & MCP Risk
Detects malicious MCP server configurations, suspicious AI IDE plugin patterns, and known exfiltration vectors across Cursor, Windsurf, VS Code, JetBrains, and more.
Known Malicious Packages
Cross-referenced against a curated database of 50+ confirmed malicious packages - supply chain attacks, protestware, typosquats, and dependency confusion vectors.
Cloud & Credential Surface
Inspects AWS, GCP, Azure, Terraform, and Kubernetes configurations. Detects SSH key exposure, Docker registry auth tokens, and OS credential stores across platforms.
Crypto & TLS Weakness Analysis
Detects deprecated TLS/SSL versions, weak ciphers, broken hash algorithms, insecure key sizes, and deprecated crypto libraries. LLM-powered contextual analysis reduces false positives.
Peer Dependency Conflicts
Parses peerDependencies from every installed npm package and validates against actual versions. Catches React 19 incompatibilities, missing required peers, and major version mismatches before they cause runtime crashes.
Deprecated API Detection
Scans dependency entry points for removed React 19 lifecycle methods (UNSAFE_componentWillMount), legacy ReactDOM.render, deprecated Node.js Buffer constructors, and obsolete built-in modules - before they break in production.
Business Process Detection
Automatically identifies business processes from structural metadata - package names, directory paths, env vars, ORM class names, OpenAPI paths. No source code transmitted. Outputs BP-IDs (BP-PAY-001, BP-AUTH-001...) with regulatory scope mapping (PCI-DSS, GDPR, HIPAA, SOX).
Logic Risk Detection
Detects 7 classes of application logic vulnerabilities: Missing Authorization, IDOR, Bypassable Workflow, Unverified State Transitions, Privileged Op Exposed, Race Conditions, Mass Assignment. Composite risk scoring 0–10.
Endpoint & Auth Map
Extracts HTTP routes with authentication/authorization status from FastAPI, Flask, Django, Express, NestJS, Next.js, Rails, Spring. Identifies unprotected sensitive endpoints without transmitting source code.
Data Asset Classification
Field-level ORM model extraction across 10+ ORMs (SQLAlchemy, Django, Prisma, TypeORM, Sequelize, Mongoose, GORM, ActiveRecord). Classifies data assets: financial, identity, PII, health, credential. Maps regulatory scope automatically.
Business Impact Report
9-section structured report linking attack vectors to business processes. Executive summary, compliance impact (PCI-DSS/GDPR/HIPAA/SOX), prioritized remediation plan sorted by severity and effort. Integrates with Pentesterra attack chain analysis.
SAST Lite - Static Analysis
Regex-based static analysis across Python and JavaScript/TypeScript source files. Detects SQL injection, XSS, command injection, SSRF, insecure deserialization, prototype pollution, and prompt injection. Privacy-first: only file path, line number, and a short snippet hash are transmitted - no source code sent.
Automation Platform Risk
Detects insecure configurations in n8n, Zapier, Make, and IFTTT workflows. Identifies dangerous execution nodes (Execute Command, Code Node), missing authentication on webhook triggers, unencrypted workflow storage, and CVE-mapped versions of automation platforms.
AI Agent Configuration Risk
Scans agent frameworks for dangerous tool exposure (ShellTool, BashTool, PythonREPLTool), unsafe prompt construction patterns, persistent memory storage risks, and unvalidated input flows in Python, TypeScript, and YAML agent definitions.
Vector DB Exposure
Identifies exposed vector database credentials and unauthenticated endpoints. Detects API keys for Pinecone, Weaviate, Qdrant, and OpenSearch in source files and environment configs. Flags Docker Compose services exposing ChromaDB, Qdrant, and Weaviate without authentication.
IDE Plugin Threat Intelligence
Cross-references your installed VS Code, Cursor, Windsurf, JetBrains, and Zed extensions against a threat intelligence database of malicious and typosquatted extensions. Detects AI agent plugins with excessive permissions and extensions reported in security advisories.
Go Security
Detects Go-specific security issues: InsecureSkipVerify in TLS configs, pprof profiler endpoints exposed without auth, math/rand used for security operations, SQL injection via fmt.Sprintf, HTTP servers without TLS. Full route enumeration for Gin, Echo, Chi, Fiber, and net/http.
PHP & CMS Security
Analyzes PHP.ini settings, Laravel .env files, and dangerous function usage (eval, exec, shell_exec, unserialize with user input). CMS coverage: WordPress plugin inventory, debug mode, xmlrpc.php exposure; Drupal, Joomla, Magento 2, and PrestaShop configuration risks.
LLM Integration & Prompt Injection Risk
Detects LLM gateway API key exposure (LiteLLM, OpenRouter, Portkey, Helicone), insecure agentic loops (while-true + LLM call without guards), LLM output piped to exec/subprocess (RCE chain), missing guardrails library, and multi-agent trust boundary violations where agent output is used as trusted tool input.
Python Runtime Execution Hook Detection
Detects supply-chain persistence and credential harvesting in installed Python packages - the class of attack used in litellm 1.82.8. Three layers: (1) .pth files with executable code in site-packages auto-executed at every Python startup; (2) installed packages reading cloud credential env vars (AWS, GCP, Azure, GitHub, OpenAI) combined with outbound network calls in the same file; (3) subprocess/os.system at module level in __init__.py. Cross-references with .env to confirm active attack surface.
Service Dependency Map
Maps every external service your project connects to: databases, LLMs, queues, object storage, auth providers, monitoring, and automation platforms. Extracted from connection strings, SDK imports, Docker Compose, and config files. Surfaces unencrypted connections, hardcoded credentials in URIs, unauthenticated endpoints, and forgotten services - like Firebase without auth or n8n without an encryption key left from the MVP phase. Available on the free tier in CLI output, IDE plugin sidebar, and web console.
Credential Flow Analysis
Traces how detected API keys and secrets are actually used in code - and whether they are being exfiltrated. Catches the most dangerous supply-chain attack: a GitHub project that works correctly but routes all LLM SDK calls through an attacker-controlled proxy via a custom base_url, silently collecting your key and every prompt. Also detects credential variables near HTTP calls to unexpected domains, subprocess curl exfiltration, credentials forwarded via webhooks, MCP servers configured with credential env vars, base64-encoded exfiltration, credentials in log statements, and secrets passed to unverified GitHub Actions.
API Route Security Analysis
Full API endpoint inventory with authentication coverage analysis across Flask, FastAPI, Django, Express, NestJS, Gin, Echo, and Chi. Detects unprotected routes, auth regressions, and missing authorization. Includes BOLA/IDOR surface detection (OWASP API Top 10 #1) - identifies authenticated endpoints that accept resource IDs without apparent ownership verification. Pre-push route diff blocks commits that introduce unprotected critical endpoints or remove authentication from existing routes.
GraphQL Security Analysis
Detects GraphQL APIs across SDL schema files, Graphene, Strawberry, Apollo, and Nexus codebases. Identifies unauthenticated mutations and sensitive queries, missing authorization decorators on resolvers, and introspection endpoints left open in production. Tracks auth coverage per operation type (query / mutation / subscription) without transmitting any source code.