ZeroPath
ZeroPath (YC S24) is an AI-native application security platform that delivers comprehensive code protection beyond traditional SAST. Founded by security engineers from Tesla and Google, ZeroPath combines large language models with deep program analysis to deliver intelligent security testing that finds real vulnerabilities while dramatically reducing false positives.
Unlike traditional SAST tools that rely on pattern matching, ZeroPath understands code context, business logic, and developer intent. This enables identification of sophisticated security issues including business logic flaws, broken authentication, authorization bypasses, and complex dependency vulnerabilities.
Our comprehensive security suite covers the application security lifecycle:
1. AI-powered SAST
2. Software Composition Analysis with reachability analysis
3. Secrets detection and validation
4. Infrastructure as Code scanning
5. Automated PR reviews
6. Automated patch generation
and more...
ZeroPath integrates seamlessly with GitHub, GitLab, Bitbucket, Azure DevOps and many more. The platform handles codebases with millions of lines across Python, JavaScript, TypeScript, Java, Go, Ruby, Rust, PHP, Kotlin and more.
Our research team has been successful in finding vulnerabilities like critical account takeover in better-auth (CVE-2025-61928, 300k+ weekly downloads), identifying 170+ verified bugs in curl, and discovering 0-days in production systems at Netflix, Hulu, and Salesforce.
Trusted by 750+ companies and performing 200k+ code scans monthly.
Learn more
Wiz
Wiz is a new approach in cloud security. It finds the most important risks and infiltration vectors across all multi-cloud environments. All lateral movement risks, such as private keys that are used to access production and development environments, can be found. You can scan for vulnerabilities and unpatched software in your workloads. A complete inventory of all services and software within your cloud environments, including version and package details, is available. Cross-reference all keys on your workloads with their privileges in your cloud environment. Based on a complete analysis of your cloud network, including those behind multiple hops, you can see which resources are publicly available to the internet. Compare your industry best practices and baselines to assess the configuration of cloud infrastructure, Kubernetes and VM operating system.
Learn more
PT Application Inspector
PT Application Inspector stands out as the sole source code analyzer that offers top-tier analysis along with efficient tools for the automatic verification of vulnerabilities, which greatly accelerates the report handling process and enhances collaboration between security experts and developers. By integrating static, dynamic, and interactive application security testing (SAST + DAST + IAST), it achieves results that are unmatched in the industry. This tool focuses exclusively on genuine vulnerabilities, allowing users to concentrate on the critical issues that truly require attention. Its distinctive features, such as precise detection, automatic validation of vulnerabilities, filtering capabilities, incremental scanning, and an interactive data flow diagram (DFD) for each identified vulnerability, significantly expedite the remediation process. By minimizing vulnerabilities in the end product, it also reduces the associated repair costs. Furthermore, it enables analysis to be conducted at the earliest phases of software development, ensuring that security is prioritized from the start. This proactive approach not only streamlines development but also enhances the overall quality and security of applications.
Learn more
Panoptic Scans
Panoptic Scans is an automated vulnerability scanning platform that delivers thorough security assessments for applications and network infrastructures. By integrating established tools like OpenVAS, ZAP, Nuclei, and Nmap, it efficiently identifies common security flaws including the critical OWASP Top 10 vulnerabilities.
The platform generates comprehensive reports that simplify the remediation process for security teams. One standout feature, Attack Narratives, illustrates potential attack paths by combining multiple vulnerabilities to highlight real-world exploitation scenarios. Users benefit from scheduled scans that provide continuous security coverage without requiring manual effort.
Panoptic Scans’ fully managed scanners and infrastructure mean clients do not need to worry about server upkeep or performance issues. The platform’s intuitive interface and email notifications ensure that teams stay informed and in control. It also supports white-label reporting, allowing organizations to customize outputs for clients or internal stakeholders.
Learn more