Scan locally. Generate PoCs. Verify in Docker.
Every finding ships with evidence: source→sink chain, guard analysis, and impact proof.
IDOR, SQLi, SSRF, Auth Bypass, and more. Deploy self-hosted or use our managed SaaS—your choice.
80.4% strict recall (correct vulnerability type + correct file) across 500 CVE repositories. See methodology →
Available as Self-Hosted or Managed SaaS
$ tracemint scan ./my-app
◈ TraceMint v2.0
├─ Analyzing: 234 files across 12 frameworks
├─ Categories: IDOR, SQLi, Auth Bypass, SSRF, XSS
└─ Running semantic analysis...
✓ Static Analysis 42 candidates
✓ Cross-file Taint 18 flows traced
✓ Guard Verification 7 confirmed vulnerabilities
⚠ CRITICAL: IDOR in OrderController.php:84
Type: Missing ownership check
Evidence: user_id not verified against session
⚠ HIGH: SQLi in SearchService.php:127
Type: Unsanitized input in raw query
$ tracemint poc --finding VH-001 --docker
├─ docker-compose detected · lab starting...
✓ Container ready mysql:8.0 + php:8.1
✓ PoC executed UNION-based extraction
✓ Impact verified: admin credentials leaked
Multi-pass analysis combines static rules with deep code comprehension
AST extraction across 30+ languages
Cross-file taint propagation
Guard & sanitizer effectiveness
Evidence-backed findings
Self-host for full control or use our managed SaaS with enterprise-grade isolation. Your code, your rules.
Every finding ships with evidence: ACCESS, BINDING, DOMINANCE, EFFECT obligations proven or failed.
We eliminate false positives—not you. 5-stage reduction pipeline + auto-generated PoCs for each finding.
FAST for CI/CD gates. BALANCED for daily scans. DEEP for security audits. Same engine, your depth choice.
Rule-based static analysis with AST parsing. Good for CI/CD and initial triage.
Static candidates verified by semantic analysis. Best precision-to-coverage ratio.
Full codebase semantic analysis. Catches edge cases and framework-specific patterns.