Skip to main content

How It Works

ZeroPath’s Static Application Security Testing (SAST) uses a multi-stage AI-powered analysis pipeline to discover vulnerabilities that traditional pattern-matching scanners miss:

Automated Scanning

Runs on push, PR, or schedule. Builds an architecture model, analyzes code, and validates every finding with AI.

Application-Aware

Identifies services and modules in your repo (e.g., /apps/payments) so findings are tied to the right team.

AI Validated

Reviews every candidate for exploitability and context, reducing false positives by up to 75%.

End-to-end Flow

1

Repository Checkout

ZeroPath clones your repository and pins the exact commit, ensuring repeatable results.
2

Application Discovery

An AI-powered analyzer maps your codebase’s services, modules, and entry points so each finding can be attributed to the right application and team.
3

Multi-Stage Pattern Analysis

Broad static analysis rules run across all supported languages, producing an initial set of candidate findings.
4

AI Validation & False-Positive Filtering

Each candidate is reviewed in context. The AI evaluates exploitability, code flow, and surrounding logic to filter out false positives, reducing noise by up to 75%.
5

Deep Codebase Analysis

A context-aware AI agent performs deeper analysis, examining authentication flows, authorization logic, business rules, and custom security policies.
6

Custom Rule Evaluation

Any natural-language rules you’ve defined are evaluated per-application, catching organization-specific security policies.
7

Deduplication & Scoring

Findings are deduplicated across tools and historical scans. Each confirmed finding receives a CVSS 4.0 severity score with AI-generated reasoning.
8

Results Delivered

Validated findings are written atomically and surfaced in your dashboard, API, and integrations.

Running Scans

Comprehensive analysis of your entire codebase. Triggered manually, on schedule, or when code is pushed to monitored branches.On subsequent scans of the same branch, ZeroPath intelligently reuses results for unchanged files and focuses deep analysis only on changed files, significantly reducing scan time.

Vulnerability Categories

CategoryExamples
InjectionSQL injection, command injection, LDAP injection
Cross-Site Scripting (XSS)Reflected XSS, stored XSS, DOM-based XSS
Server-Side Request Forgery (SSRF)Internal service access, cloud metadata exfiltration
File OperationsPath traversal, local file inclusion, arbitrary file read/write
Insecure DeserializationObject injection, remote code execution via deserialization
XML External Entity (XXE)External entity expansion, SSRF via XML
Template InjectionServer-side template injection (SSTI)
CryptographyWeak algorithms, hardcoded keys, insufficient key length
Open RedirectUnvalidated redirect targets
CORS MisconfigurationOverly permissive cross-origin policies
CSRFMissing or bypassable cross-site request forgery protections
Denial of ServiceReDoS, resource exhaustion, algorithmic complexity
Information DisclosureSensitive data in responses, error message leakage
ReflectionReflected input flaws, unsafe reflection
Memory SafetyBuffer overflows, use-after-free, out-of-bounds access
Input ValidationMissing or improper input validation
ConfigurationInsecure defaults, debug mode in production

Severity Scoring

ZeroPath uses CVSS 4.0 as its scoring standard. Every confirmed finding receives a structured score with AI-generated reasoning tied directly to the code.
MetricValuesWhat It Captures
Attack VectorNetwork / LocalWhether exploitable remotely or requires local access
Attack ComplexityLow / HighReliability of exploit; whether special conditions are needed
Attack RequirementsNone / PresentWhether prerequisites (specific config/state) are required
Privileges RequiredNone / Low / HighPrivilege level the attacker needs
User InteractionNone / Passive / ActiveWhether a user must take action for exploitation
Confidentiality ImpactNone / Low / HighImpact on data secrecy
Integrity ImpactNone / Low / HighImpact on data or system integrity
Availability ImpactNone / Low / HighImpact on system availability
Each metric includes a written rationale tied to the specific code snippet and vulnerability context.
The overall finding priority score combines severity with confidence:severity (0–10) × confidence (0–10) = a 0–100 scale for ranking and filtering.This means a high-severity finding with low confidence ranks lower than a medium-severity finding with high confidence — helping you focus on issues that are both impactful and reliably identified.

Language Coverage

Python

JavaScript / TypeScript

Java

Go

https://mintcdn.com/zeropath/m2g7S38Ier9Tpvr-/icons/ruby.svg?fit=max&auto=format&n=m2g7S38Ier9Tpvr-&q=85&s=4c97571ab4bfc1ed7c4c714fe08840fe

Ruby

PHP

https://mintcdn.com/zeropath/m2g7S38Ier9Tpvr-/icons/c.svg?fit=max&auto=format&n=m2g7S38Ier9Tpvr-&q=85&s=8550bd7eba485a7044a9ec94c4a803fc

C / C++

https://mintcdn.com/zeropath/m2g7S38Ier9Tpvr-/icons/csharp.svg?fit=max&auto=format&n=m2g7S38Ier9Tpvr-&q=85&s=45d37f047f48e568c92b00a0383c8899

C#

Rust

Swift / Objective-C

https://mintcdn.com/zeropath/m2g7S38Ier9Tpvr-/icons/kotlin.svg?fit=max&auto=format&n=m2g7S38Ier9Tpvr-&q=85&s=5a0feaef14e13d3457b0ab4a70180a8d

Kotlin

https://mintcdn.com/zeropath/m2g7S38Ier9Tpvr-/icons/scala.svg?fit=max&auto=format&n=m2g7S38Ier9Tpvr-&q=85&s=a63c6016a34a91f2c71fdc87fb19f75c

Scala

https://mintcdn.com/zeropath/m2g7S38Ier9Tpvr-/icons/dart.svg?fit=max&auto=format&n=m2g7S38Ier9Tpvr-&q=85&s=a91cacb3b1ec62c3d2a66bad55f5647d

Dart

https://mintcdn.com/zeropath/m2g7S38Ier9Tpvr-/icons/elixir.svg?fit=max&auto=format&n=m2g7S38Ier9Tpvr-&q=85&s=3805bb68956761932dcc30e616bde377

Elixir

https://mintcdn.com/zeropath/m2g7S38Ier9Tpvr-/icons/nim.svg?fit=max&auto=format&n=m2g7S38Ier9Tpvr-&q=85&s=e1af90b0b4d94b17b7891025384713d8

Nim

Each finding is tagged with the detected language of the affected file, enabling language-aware filtering and remediation guidance.

Key Capabilities

75% Fewer False Positives

AI validation reviews every finding in context, filtering out issues that aren’t actually exploitable.

Novel Vulnerability Detection

Deep AI analysis discovers vulnerabilities that pattern-matching alone cannot find, including business logic flaws.

Application-Aware Findings

Each finding is tied to the specific service or module it affects, with tech stack and architecture context.

Data Flow Visualization

Source-to-sink traces show exactly how tainted data reaches vulnerable operations.

Deterministic Results

Same codebase at the same commit produces the same findings, enabling reliable audits and compliance tracking.

Auto-Fix Capable

Qualifying findings can be automatically patched with AI-generated code fixes.

Adoption Checklist

1

Connect Your Repository

Add your repo via GitHub App, GitLab, Bitbucket, or direct URL. See Quick Start.
2

Confirm SAST Is Enabled

SAST is enabled by default in scanner settings for all repositories.
3

Run Your First Scan

Trigger a full scan from the dashboard or wait for the next scheduled scan.
4

Review Findings

Browse findings in the dashboard, grouped by severity, application, and category.
5

Configure Thresholds

Adjust confidence filtering and PR check failure thresholds to match your team’s tolerance.
6

Enable PR Scanning

Turn on PR scanning to catch vulnerabilities before they reach your main branch.
7

Set Up Integrations

Route findings to Jira, Linear, Slack, or webhooks.
8

Define Custom Rules

Add natural-language rules for organization-specific security policies. See Custom Rules.