ZeroPath
ZeroPath (YC S24) is an AI-native application security platform that delivers comprehensive code protection beyond traditional SAST. Founded by security engineers from Tesla and Google, ZeroPath combines large language models with deep program analysis to deliver intelligent security testing that finds real vulnerabilities while dramatically reducing false positives.
Unlike traditional SAST tools that rely on pattern matching, ZeroPath understands code context, business logic, and developer intent. This enables identification of sophisticated security issues including business logic flaws, broken authentication, authorization bypasses, and complex dependency vulnerabilities.
Our comprehensive security suite covers the application security lifecycle:
1. AI-powered SAST
2. Software Composition Analysis with reachability analysis
3. Secrets detection and validation
4. Infrastructure as Code scanning
5. Automated PR reviews
6. Automated patch generation
and more...
ZeroPath integrates seamlessly with GitHub, GitLab, Bitbucket, Azure DevOps and many more. The platform handles codebases with millions of lines across Python, JavaScript, TypeScript, Java, Go, Ruby, Rust, PHP, Kotlin and more.
Our research team has been successful in finding vulnerabilities like critical account takeover in better-auth (CVE-2025-61928, 300k+ weekly downloads), identifying 170+ verified bugs in curl, and discovering 0-days in production systems at Netflix, Hulu, and Salesforce.
Trusted by 750+ companies and performing 200k+ code scans monthly.
Learn more
Aikido Security
Aikido is the all-in-one security platform for development teams to secure their complete stack, from code to cloud. Aikido centralizes all code and cloud security scanners in one place.
Aikido offers a range of powerful scanners including static code analysis (SAST), dynamic application security testing (DAST), container image scanning, and infrastructure-as-code (IaC) scanning.
Aikido integrates AI-powered auto-fixing features, reducing manual work by automatically generating pull requests to resolve vulnerabilities and security issues. It also provides customizable alerts, real-time vulnerability monitoring, and runtime protection, enabling teams to secure their applications and infrastructure seamlessly.
Learn more
Apiiro
Achieve complete risk visibility at every stage of development, from design through coding to cloud deployment. Introducing the industry-leading Code Risk Platform™, which offers a comprehensive 360° overview of security and compliance threats across various domains, including applications, infrastructure, developers' expertise, and business ramifications. By making data-driven choices, you can enhance decision-making quality. Gain insight into your security and compliance vulnerabilities through a dynamic inventory that tracks application and infrastructure code behavior, developer knowledge, third-party security alerts, and their potential business consequences. Security professionals are often too busy to meticulously scrutinize every modification or to delve into every alert, but by leveraging their expertise efficiently, you can analyze the context surrounding developers, code, and cloud environments to pinpoint significant risky changes while automatically creating a prioritized action plan. Manual risk assessments and compliance evaluations can be a drag—they are often laborious, imprecise, and out of sync with the actual codebase. Since the design is embedded in the code, it’s essential to improve processes by initiating intelligent and automated workflows that reflect this reality. This approach not only streamlines operations but also enhances overall security posture.
Learn more
AWS Security Agent
The AWS Security Agent represents a groundbreaking AI-driven solution that actively safeguards your applications at every stage of the development lifecycle, starting from the initial design and architectural considerations, continuing through code modifications, and extending to deployment and penetration testing phases. This innovative tool empowers security teams to establish organizational security protocols—such as approved authentication libraries, encryption practices, logging methods, and data access policies—once within the AWS Console; thereafter, the agent automatically checks design documents, architectural blueprints, and code against these established standards. Notably, even before any coding begins, the AWS Security Agent is capable of conducting a thorough design review, scrutinizing architectural documents uploaded to the web application or retrieved from storage, while identifying potential security vulnerabilities or deviations from either custom or Amazon's managed standards, and offering guidance for remediation. Furthermore, this proactive approach not only enhances security but also fosters compliance and best practices across the entire development process.
Learn more