Verified Agent Execution

Every code change, verified before merge

Domain-specific security oracles that understand your codebase. Checks every pull request against 150+ rules for supply chain attacks, source map leaks, JIT safety, and sandbox integrity.

15
Security Oracles
150+
Security Rules
3
Live Attack Demos
<2m
Per Check

Hierarchical Verification Pipeline

Each PR passes through progressive stages. Fast triage eliminates noise, domain oracles catch real issues.

L0

Triage

Skip docs, images, and config-only changes

< 1 second
L1

Scope

Classify files into security domains

< 10 seconds
L2

Oracles

Domain-specific checks per component

< 2 minutes
L3

Fuzz

Targeted fuzzing of changed code paths

Coming soon

Real Attacks, Detected in Real Time

Three real supply chain incidents from March 2026. Click a tab, hit "Run Detection", and watch the oracle pipeline analyze the malicious diff.

axios RAT
Claude Code Leak
LiteLLM Backdoor
attest/api/demo/axios

15 Security Oracles

Each oracle encodes deep domain knowledge about a component's threat model and safety invariants. New projects get auto-generated oracles on first scan.

SC

Supply Chain

Obfuscated exec, credential harvest, exfil, persistence, RAT droppers

PH

Packaging Hygiene

Source map leaks, credential exposure, feature flags, .npmignore

V8

V8 Engine

Sandbox, JIT bounds, GC barriers, WASM, CFI

BL

Blink Renderer

Origin checks, CSP, TrustedTypes, frame safety

BP

Browser Process

Site isolation, commit validation, IPC

FF

FFmpeg

Codec whitelist, AVIO, buffer padding, OOM

NT

Net Stack

TLS, HSTS, cookies, CORS, isolation

MJ

Mojo IPC

Message validation, interfaces, [Sync]

SB

OS Sandbox

seccomp-BPF, syscall allowlists, broker

XM

libxml

XXE flags, entity expansion, API bounds

CU

curl / libcurl

TLS verification, credentials, redirects

SP

Security Props

Auto-mined OWNERS, C safety, IPC patterns

BE

Behavioral Equiv

API surface, permissions, test regression

TS

Test Coverage

Missing tests, weakened assertions

What Would We Have Caught?

Real supply chain incidents and CVEs mapped to the exact oracle rules that flag them.

Supply Chain · axios npm · March 31, 2026

axios: Compromised npm account drops cross-platform RAT

Attacker hijacked maintainer's npm account, published axios@1.14.1 with phantom dependency "plain-crypto-js". Postinstall dropper delivers platform-specific RATs (Mach-O/PowerShell/Python) beaconing to C2 every 60s. Self-deletes evidence post-infection. 83M weekly downloads.
supply_chain:known_iocsupply_chain:phantom_dependencysupply_chain:self_deleting_droppersupply_chain:powershell_hidden
Attest: 18 findings — C2 domain + phantom dep + self-deleting dropper + registry persistence + hidden PowerShell
Source Leak · Anthropic · March 31, 2026

Claude Code: Source map exposes 512K lines of proprietary code

A .map file in the npm package referenced full unminified TypeScript on an R2 bucket. 44 unreleased feature flags (KAIROS, ULTRAPLAN, VOICE_MODE) and complete architecture exposed.
packaging_hygiene:source_map_shippedpackaging_hygiene:source_map_exclusion_removedpackaging_hygiene:source_and_flags_exposed
Attest: 7 findings — source map in dist/ + *.map exclusion removed + feature flags exposed
Supply Chain · LiteLLM/TeamPCP · March 24, 2026

LiteLLM: CI/CD hijack injects credential stealer via PyPI

TeamPCP compromised Trivy GitHub Action, hijacked LiteLLM's CI/CD, published litellm@1.82.7 with base64-encoded credential stealer + .pth persistence file. 95M monthly downloads.
supply_chain:obfuscated_execsupply_chain:ssh_key_accesssupply_chain:pth_filesupply_chain:attack_pattern_combined
Attest: 8 findings — base64 exec + credential harvesting + .pth persistence + exfiltration
167tests passing
3%false positive rate
90%catch rate
0false negatives on CVEs

Ready to verify your PRs?

Connect a repo in 60 seconds. No code changes required.

Launch App Contact Us