ZeroPath
ZeroPath (YC S24) is an AI-native application security platform that delivers comprehensive code protection beyond traditional SAST. Founded by security engineers from Tesla and Google, ZeroPath combines large language models with deep program analysis to deliver intelligent security testing that finds real vulnerabilities while dramatically reducing false positives.
Unlike traditional SAST tools that rely on pattern matching, ZeroPath understands code context, business logic, and developer intent. This enables identification of sophisticated security issues including business logic flaws, broken authentication, authorization bypasses, and complex dependency vulnerabilities.
Our comprehensive security suite covers the application security lifecycle:
1. AI-powered SAST
2. Software Composition Analysis with reachability analysis
3. Secrets detection and validation
4. Infrastructure as Code scanning
5. Automated PR reviews
6. Automated patch generation
and more...
ZeroPath integrates seamlessly with GitHub, GitLab, Bitbucket, Azure DevOps and many more. The platform handles codebases with millions of lines across Python, JavaScript, TypeScript, Java, Go, Ruby, Rust, PHP, Kotlin and more.
Our research team has been successful in finding vulnerabilities like critical account takeover in better-auth (CVE-2025-61928, 300k+ weekly downloads), identifying 170+ verified bugs in curl, and discovering 0-days in production systems at Netflix, Hulu, and Salesforce.
Trusted by 750+ companies and performing 200k+ code scans monthly.
Learn more
Tremendous
Tremendous is the easiest way to distribute digital rewards and incentives globally. Tremendous allows you to instantly reward your recipients using gift cards, prepaid Visa®, cards, cash, or other digital rewards. Companies large and small can easily track, buy, and manage incentive programs at scale with us. Tremendous allows customers to send rewards individually or in bulk. Our API also allows customers to integrate with our API and automatically send rewards.
We work with top brands around the world to support their specific use cases, such as market research, customer loyalty and health & wellbeing, employee rewards, referrals, etc.
Tremendous is completely free to use. There are no platform fees
Tremendous is currently the only platform that allows cash disbursements (Bank/ACH, PayPal).
Tremendous has the best international coverage (230+ countries and regions).
Tremendous has created the best API in the industry
Learn more
Hacken
Hacken is one of the key players in the blockchain security field, with a track record of more than 2,000 audits for over 1,500 worldwide clients since 2017. Their clients include big names such as 1inch, Radix, NEAR Protocol, Sandbox, Wemix, Status, Aurora, ShapeShift, Unicrypt, Venom, Enjin, Status, and PolkaStarter, to name a few.
Their team is powered by more than 150 global talents, including 60 top-class professional engineers dedicated to keeping projects safe. Trusted by industry giants like Coingecko and Coinmarketcap, Hacken's contributions have achieved wide recognition.
Beyond Smart Contract Security Audits, Hacken offers a comprehensive suite of services, including Blockchain Protocol Audits, Penetration Testing, dApp Audits, Crypto Wallet Audits, Cross-Chain Bridge Audits, Bug Bounties, Proof of Reserves, CCSS Audits, and Tokenomics Audits & Design.
From security audits and bug bounties to DORA Compliance, AML Monitoring, and Threat-Led Penetration Testing, Hacken delivers solutions that bridge innovation and compliance. Through collaborations with institutions like the European Commission and ADGM, Hacken sets security standards, fostering trust and resilience in the blockchain ecosystem.
Learn more
HackenProof
We are a web3 bug bounty platform since 2017.
We help to set a clear scope (or you can do it by yourself), agree on a budget for valid bugs (platform subscription is free), and make recommendations based on your company`s needs.
We launch your program and reach out to our committed crowd of hackers, attracting top talent to your bounty program with consistent and coordinated attention.
Our community of hackers starts searching for vulnerabilities. Vulnerabilities are submitted and managed via our Coordination platform. Reports are reviewed and triaged by the HackenProof team (or by yourself), and then passed on to your security team for fixing.
Our bug bounty platform allows you to get continuous information (ongoing security for your app) on the condition of security of your company.
Independent security researchers can also report any breaches found in a legal manner.
Learn more