Skip to content
Core Feature

AI Security Scanner

AI-powered GDPR-compliant security scanning. OWASP Top 10 coverage, SARIF output for GitHub Security, auto-patch suggestions. EU-hosted, zero data retention.

GDPR-Compliant · EU-Hosted · Zero Data Retention
🔐

Crypto & Secrets

Cryptography review and secret detection in your codebase.

🔑

Authentication

Authentication vulnerabilities and common misconfigurations.

💉

Injection Detection

SQL, XSS, and command injection, checked systematically.

📦

Supply Chain

Dependency audits and SBOM for traceable supply chains.

📋

SARIF Output

Standard security report format for tools and CI.

🔄

CI Integration

`security-ci` for automated security pipelines.

Lurus Code AI security scanner showing OWASP Top 10 vulnerability findings with auto-fix suggestions

How the 4-Phase Scan Works

Every scan runs through four specialized phases. Each phase builds on the previous one — from surface discovery to verified, actionable findings with fix suggestions.

1

1/4 · Discovery

The scanner maps your entire project: directory structure, file types, entry points, configuration files, and dependency manifests. It identifies the attack surface before any analysis begins.

Identifies: source files, configs, package.json / pom.xml / requirements.txt, .env files, Dockerfiles

2

2/4 · Analysis

Deep static analysis against the OWASP Top 10 and common CWE patterns. The AI model reads code in context — not just pattern-matches — catching logic flaws that regex-based tools miss.

Covers: OWASP A01–A10, hardcoded secrets, insecure deserialization, path traversal, SSRF

3

3/4 · Verification

Each finding is cross-checked against the codebase to eliminate false positives. The verifier confirms exploitability and assigns severity: Critical, High, Medium, Low, or Info.

Result: verified findings only, false-positive rate <15%, severity assignment per CVSS

4

4/4 · Remediation

For every confirmed finding, the scanner generates a concrete fix suggestion with a code diff. Suggestions reference the relevant CWE and include a short explanation of the vulnerability.

Output: fix diff, CWE reference, severity, affected file + line number

OWASP Top 10 Coverage

The Lurus Code security scanner covers all 10 OWASP vulnerability categories out of the box — no configuration needed.

A01

Broken Access Control

Missing authorization checks, IDOR, privilege escalation

A02

Cryptographic Failures

Weak ciphers, hardcoded secrets, insecure key storage

A03

Injection

SQL, NoSQL, command, XSS, SSTI injection vectors

A05

Security Misconfiguration

Default credentials, open CORS, verbose error pages

A06

Vulnerable Components

Outdated dependencies with known CVEs, SBOM gaps

A07

Auth Failures

Weak passwords, missing MFA, broken session management

A08

Data Integrity Failures

Unsigned updates, insecure deserialization

A09

Logging Failures

Missing security events, sensitive data in logs

SARIF & GitHub Security Tab

SARIF (Static Analysis Results Interchange Format) is the Microsoft/GitHub standard for security tooling. Lurus Code outputs SARIF by default — which means findings appear directly in the GitHub Security tab, as inline PR annotations, and in any SARIF-compatible CI dashboard.

  • Findings appear as inline PR review comments on the exact lines
  • GitHub Security tab shows all open, dismissed, and fixed alerts
  • SARIF files archive to your repository for audit trails
  • Works with GitLab SAST, Azure DevOps, and JetBrains Qodana
terminal
lurus security-ci --diff --format sarif --output results.sarif

CI/CD Integration

Drop the security-ci command into any CI pipeline. It runs headless, returns standard exit codes, and posts findings directly to your pull request.

github-actions.yml
- name: AI Security Scan
  run: lurus security-ci --diff --fail-on high
  env:
    GITHUB_TOKEN: ${{ secrets.GITHUB_TOKEN }}

Exit Codes

0 No findings at or above the configured severity threshold
1 Blocking findings found (at or above --fail-on level)
2 Scan error (missing credentials, network, etc.)
3 Credit balance exhausted — partial results returned
🇪🇺 GDPR & EU Compliance

GDPR & EU Compliance

Every byte of your source code is processed exclusively on EU-hosted infrastructure. No code is stored after the scan completes. A Data Processing Agreement (DPA) is available for enterprise customers.

🇪🇺

EU-only processing

All AI inference runs on servers located in Germany and France. No data ever touches US or non-EU infrastructure.

🗑️

Zero retention

Source code is discarded immediately after the scan. Nothing is logged, cached, or used for model training.

📋

DPA available

A Data Processing Agreement (Art. 28 GDPR) is available for all paid plans.

🏥

Regulated industries

Meets requirements for healthcare (MDR), finance (DORA, PCI-DSS), and public-sector software procurement.

Frequently Asked Questions

How does the false-positive rate compare to Snyk or SonarQube?
Traditional SAST tools rely on pattern matching, which produces high false-positive rates (often 40–60%). Lurus Code uses an LLM that understands code in context and runs a dedicated verification phase to confirm each finding before reporting it. In practice this brings false positives below 15%.
Which programming languages are supported?
Any language the underlying model can read — which includes TypeScript, JavaScript, Python, Java, Go, Rust, PHP, Ruby, C/C++, C#, Kotlin, Swift, and more. There is no language-specific ruleset to maintain.
Can I scan only changed files in a pull request?
Yes. Use lurus security-ci --diff to scan only the files changed since the last commit, or --diff-base main to compare against a specific branch. This keeps scan times short in CI.
Is the scanning GDPR-compliant?
Yes. All processing happens on EU-hosted servers. No source code is stored after the scan. A DPA (Data Processing Agreement per Art. 28 GDPR) is available for paid plans.
What is the difference between lurus security-ci and the /scan slash command?
lurus security-ci is the headless CI command — it exits with a status code and writes a report file. /scan is the interactive chat command — it runs the same scan but streams results in the terminal and lets you ask follow-up questions about each finding.

Secure your code

Find vulnerabilities early with specialized scans and standardized SARIF reports.

Get started