Platform Architecture
CodeThreat operates through two complementary layers: Deterministic Layer: Rule-based security scanning engines perform pattern matching and static analysis across codebases. Agentic Layer: AI agents provide contextual analysis, false positive elimination, and intelligent security reviews.Pull Request Workflow
Every pull request triggers deterministic scanning and agentic analysis:- Developer creates PR → CodeThreat automatically scans changed files
- Deterministic scanning runs (SAST, SCA, Secrets, IaC)
- False Positive Elimination filters SAST results
- PR Review Agent analyzes PR changes with contextual understanding
- Security feedback appears in PR comments
- Developer fixes issues and pushes updates
Full Repository Analysis
Agentic SAST performs comprehensive repository analysis:- Full repository scan → Runs deterministic engines and Agentic SAST
- Deterministic engines run (SAST, SCA, Secrets, IaC)
- False Positive Elimination filters deterministic SAST results
- Agentic SAST performs deep analysis with Repository Memory and Vuln Context components
- Complete report → All findings combined
Deterministic Detection Engines
Deterministic scanning engines identify security vulnerabilities using established patterns, rules, and vulnerability databases. These work together with agentic analysis for complete security coverage.Deterministic SAST
Rule-based static analysis for code vulnerabilities. 1,740+ security rules across 27+ languages. Enhanced by False Positive Elimination agent and Agentic SAST deep analysis.
SCA
Dependency vulnerability scanning with CVE matching. Supports all major package managers.
Secrets Detection
Pattern-based detection of exposed credentials, API keys, and sensitive data.
IaC Security
Infrastructure-as-code scanning for configuration misconfigurations and compliance violations.
Agentic Analysis Capabilities
AI agents operate autonomously to provide contextual security analysis beyond deterministic pattern matching.Agentic SAST
Graph-based code analysis identifying logic flaws, authorization issues, and design failures.
False Positive Elimination
Analyzes deterministic SAST results to reduce false positives through contextual understanding.
PR Reviews
Contextual security analysis of pull requests with impact assessment and remediation guidance.
Security Analysis
On-demand repository security analysis for design issues and architectural vulnerabilities.
How It Works
CodeThreat integrates into your development workflow with three primary scanning modes:Pull Request Scanning
- Developer creates PR → Deterministic SAST scans changed files → False Positive Elimination filters results → PR Review Agent provides feedback → Developer fixes issues
Push to Main Branch
- Code pushed to main → Full branch deterministic scan → False Positive Elimination → Results in dashboard
Full Repository Analysis
- Full repository scan → All deterministic engines → False Positive Elimination → Agentic SAST with Repository Memory and Vuln Context components → Comprehensive report
Platform Capabilities
Deterministic Security Scanning
- Deterministic SAST: Rule-based static analysis across 27+ languages, enhanced by False Positive Elimination and Agentic SAST for complex vulnerabilities
- SCA: Dependency vulnerability scanning across all major package ecosystems
- Secrets Detection: Pattern-based credential and API key detection
- IaC Security: Infrastructure configuration scanning for cloud platforms and IaC tools
Agentic Security Analysis
- Agentic SAST: Deep code analysis using graph-based analysis for complex vulnerabilities
- False Positive Elimination: Contextual analysis of deterministic SAST results
- PR Reviews: Intelligent security review of pull requests
- Security Analysis: On-demand repository security analysis for design issues and architectural vulnerabilities
- Repository Mapping: Endpoint and database provider identification
Next Steps
Quick Start
Connect repositories and run your first scan
Deterministic SAST
Learn about rule-based static analysis
Agentic SAST
Understand AI-powered code analysis
AI Features
Explore agentic security capabilities
Repository Integration
Connect GitHub, GitLab, Azure DevOps, or Bitbucket
Detection Engines
Learn about deterministic scanning engines
