Proprietary static analysis, attack path visualization, AI risk attribution, and automated remediation. All in the same scan workflow.
🧬
Proprietary SAST engine
AST-based taint analysis for JavaScript/TypeScript and Python, plus deep pattern analysis across Java, C#, Go, PHP, Ruby, Kotlin, C/C++, IaC, and GraphQL. Tracks data flow from user-controlled sources through sanitizers to dangerous sinks — detecting injection flaws, path traversal, SSRF, XSS, hardcoded secrets, and more.
JS · TS · Python · Java · C# · Go · PHP · Ruby · Kotlin · C/C++ · IaC · GraphQL
🕸️
Attack Path Graph
Visualizes how reachable vulnerabilities connect through your dependency tree to potential exploit entry points. Each path is scored by reachability, sink type, CWE mapping, and AI-code amplification.
Force-directed graph · Path scoring
🤖
AI risk attribution
Estimates the proportion of AI-assisted code in your repository using git-signal analysis and style heuristics. Surfaces AI-code co-location with security findings for informed risk attribution.
Git signal · Style analysis · Risk overlay
⚡
Decision engine
Every vulnerability gets a prioritized instruction — Patch Now, Patch This Sprint, Monitor, or Accept Risk — from EPSS scores, CISA KEV status, reachability signals, and exploit database presence. Includes SLA timelines and human-readable rationale per finding.
48h / 336h / 720h SLAs
🔧
Remediation PRs
Automatically open pull requests on GitHub, GitLab, and self-hosted instances with version bumps and lockfile regeneration for fixable vulnerabilities. Includes breaking-change analysis, manifest patching across 9 ecosystems, and PR decoration with the full evidence bundle. Select specific CVEs, configure the target branch, and track PR status from the monitoring dashboard.
GitHub · GitLab · Self-hosted · Lockfile regen · Breaking-change analysis
💬
Native notifications
Auto-detected by hostname: Slack (Block Kit), Microsoft Teams (Adaptive Card), Discord (embed), generic JSON webhook. Severity-coded alerts on new findings, policy failures, and firewall blocks. Email (SMTP) supported in parallel.
Slack · Teams · Discord · Webhook · Email
🎫
Ticketing integrations
Native Jira and Linear integration. Auto-create tickets from findings or firewall events with severity, evidence bundle link, and remediation guidance attached. Round-trip status updates back to dpndncY.
Jira · Linear
📈
Trend snapshots & risk-over-time
Automatic per-scan snapshots with the full risk-vector preserved. Historical trend engine surfaces risk-over-time per project, per ecosystem, per severity, and per finding type — so the security review meeting starts with "what changed since last month."
Per-scan snapshots · Risk delta over time
📏
Dependency health scoring
Per-package health score combining maintainer count, release cadence, install scripts, license clarity, and vulnerability history. Surfaces low-health packages independent of their CVE status — future risk indicators, not just known vulns.
Trust score · Maintainer signals · Anomaly index
⚖️
License obligations engine
Beyond allow/deny: surfaces the actual obligations triggered by each license (attribution, source disclosure, copyleft scope, patent grant, NOTICE file requirements). Generates the obligation manifest your legal team needs.
SPDX · Obligation graph · Copyleft scope
💻
VS Code extension
Scan your open workspace, view SBOM and vulnerability results, and check individual package risk — all within VS Code. Authenticates with your dpndncY instance via Personal API Token.
Workspace scan · PAT auth · Inline results
📋
Compliance policy presets
17 built-in policy templates tuned for regulated industries — FedRAMP, HIPAA, PCI-DSS, ISO 26262 (automotive), NERC CIP (energy), DoD STIG, telecommunications, IoT, gaming, healthcare, and more. Presets auto-apply to workspace scans and are selectable per monitored project.
FedRAMP · HIPAA · PCI-DSS · ISO 26262 · NERC CIP · DoD · +11 presets