45% of AI-generated code contains security vulnerabilities (Veracode 2025)

Stop shipping
hackable code

The complete security toolkit for solo SaaS founders. Find vulnerabilities in AI-generated code, generate procurement-ready security overviews, and auto-fill the questionnaires your B2B prospects send you. Built for Cursor, Lovable, Bolt, and Replit users.

$ npx xploitscan scan .orScan Now — Free

Just need a trust page for sales? Build one free in 2 min — no signup →

~/my-saas-app

$

D35/100

Would your app pass a security scan?

3 CRITICAL1 HIGH1 MEDIUM2 LOWHardcoded secrets, SQL injection, XSS, unprotected webhooks

See the full report with fix suggestions →

Built for developers like

indie hackerssolo foundersstartup teamsY Combinator buildersopen source devs

How it works

Three ways to scan your code. Pick what works for you.

1

Upload your code

Drag and drop your project files or paste a GitHub URL. No signup needed.

2

Wait a few seconds

Our scanner runs 206 rules across your entire codebase.

3

Get your report

See your security grade, findings, and fix suggestions in plain English.

D35/100

my-saas-app

47 files scanned · 2.3s

3 CRITICAL1 HIGH1 MEDIUM
Hardcoded API key in .env
SQL injection in server.js
Unprotected Stripe webhook
See the full demo report →
Start your first scan — free

No credit card. No signup. 5 free scans per day.

Try it now

Paste code or upload a file — no signup required. Scanned with 30 free rules.

Security scanning that speaks your language

Catch the vulnerabilities that AI coding tools miss — in seconds, not hours.

151 Security Rules

Purpose-built for AI-generated code. 206 rules across secrets, injection (SQL, XSS, NoSQL, SSRF), auth, crypto, Docker, Kubernetes, CI/CD, IAM, Electron, mobile, and more.

Plain-English Results

Every vulnerability explained in plain English with copy-paste fix suggestions. No security expertise required.

One Command

npx xploitscan scan . — no config, no setup, no account required. Works with any JS/TS/Python project out of the box.

CI/CD Ready

GitHub Action with SARIF output. Findings appear in GitHub Security tab. Block PRs with critical vulnerabilities.

GitHub App — Auto-Scan PRs

Install once, every pull request gets scanned automatically with a Check Run and inline review comments. No workflow file, no API key, no config.

Compliance Mapping

Every finding mapped to SOC2, ISO 27001, OWASP Top 10, and CWE. Export compliance reports for audits. Enterprise-ready out of the box.

Built for Non-Experts

No security jargon. Instead of "IDOR vulnerability via insecure direct object reference", we say "anyone can access other users' data by changing the ID in the URL."

Compliance Ready

Every finding mapped to real compliance controls

XploitScan maps all 206 rules to SOC2 Trust Service Criteria, ISO 27001 Annex A controls, OWASP Top 10, and CWE — so you can see exactly how your code measures up.

SOC2ISO 27001OWASP Top 10CWE
View compliance dashboard →

Simple pricing

Start free. Upgrade when you need more.

MonthlyAnnualSave 40%

Free

$0/mo

No credit card required

  • 5 scans per day
  • 30 core security rules
  • Terminal + JSON + SARIF
  • .xploitscanrc config
npx xploitscan scan .

Indie

$9/mo

No free trial

  • 500 scans per month
  • All 206 security rules
  • Scan history dashboard
  • GitHub Action (all rules)
  • CLI + web + VSCode
POPULAR

Pro

$19/mo

7-day free trial

  • Unlimited scans
  • All 206 security rules
  • PDF security reports
  • SOC2/ISO27001 mapping
  • Slack/Discord webhooks
  • AI false-positive filter
  • Public security badge
  • Priority support

Team

$99/mo

5 seats included, +$15/seat

  • Everything in Pro
  • 5 team seats included
  • Shared scan history
  • Role-based access (RBAC)
  • Portfolio security reports
  • Centralized billing

Feature comparison

Feature
Free
Indie
Pro
Team
Security scans
5/day
500/month
Unlimited
Unlimited
Security rules
30 core
All 206
All 206
All 206
Plain-English results
Terminal + JSON output
SARIF output for GitHub
GitHub Action
30 rules
All 206
All 206
All 206
GitHub App (auto-scan PRs)
30 rules
All 206
All 206 + AI filter
All 206 + AI filter
.xploitscanrc config
Scan history dashboard
PDF security reports
Slack/Discord webhooks
SOC2/ISO27001 mapping
AI false-positive filter
Public security badge
Public Trust Page (procurement-ready)
Security Questionnaire auto-fill
Questionnaire Library (track per-prospect responses)
Sales collateral generator (datasheet, MSA clause, email signature)
Custom domain for Trust Page
GitHub URL scanning
Team seats
5 included
Shared scan history
Role-based access (RBAC)
Portfolio reports
Centralized billing
Priority support

Latest from the blog

Real vulnerabilities, fixes, and post-mortems for AI-generated code.

All posts →

Frequently asked questions

Everything you need to know about XploitScan.

The CLI runs 100% locally — your code never leaves your machine. The web scanner sends files to our API only for the duration of the scan: they're processed in memory, scanned against our rules, and discarded immediately. We never write your source code to disk or a database. We only persist scan metadata (grade, score, finding counts, file paths) — never the file contents themselves.

JavaScript, TypeScript, Python, Ruby, Go, Rust, Java, PHP, Swift, Kotlin, C#, and 30+ more. We also scan config files: Dockerfile, docker-compose, Terraform, Kubernetes manifests, CI/CD workflows, .env files, and package manifests.

Traditional SAST tools are designed for hand-written enterprise code. They produce hundreds of irrelevant findings and require security expertise to interpret. XploitScan is purpose-built for AI-generated code — our 206 rules target the specific patterns that AI tools produce, and every finding is explained in plain English with a copy-paste fix.

Detection quality is public and measured continuously. Every commit runs against a labeled corpus of 151 fixtures covering 25+ vulnerability classes, and the numbers are live at xploitscan.com/benchmark. Current: 100% precision (zero false positives on the corpus) and 80%+ recall on rules with active test fixtures. We also run Semgrep and Bearer against the same corpus for side-by-side comparison. The corpus, runners, and methodology are open-source at github.com/bgage72590/vibecheck — you can reproduce the scores locally. Tracked-but-not-yet-detected cases are shown openly on the page rather than hidden.

Free plan: 5 scans per day with 30 core security rules. Indie plan ($9/mo): 500 scans per month with all 206 rules and scan history dashboard. Pro plan ($19/mo): unlimited scans with all 206 rules, plus PDF reports, SBOM generation, compliance mapping, webhook integrations, and AI false-positive filter. Team plan ($99/mo): everything in Pro plus 5 team seats, shared scan history, RBAC, and portfolio reports. Annual plans save 40%.

Yes! Use our official GitHub Action to scan on every PR. It outputs SARIF for the GitHub Security tab and can block merges when critical vulnerabilities are found. Run 'npx xploitscan scan . --format sarif' in any CI pipeline.

Most scans complete in under 5 seconds. Large projects (1000+ files) may take up to 30 seconds. The CLI is even faster since it runs locally without network overhead.

Yes — paste a public repo URL in the web scanner, or use the CLI locally for private repos: 'npx xploitscan scan /path/to/repo'. The CLI never uploads your code.

Yes — save 40% with annual billing. Indie is $5/mo ($59/year), Pro is $10/mo ($119/year), and Team is $59/mo ($699/year) when billed annually. You can switch between monthly and annual at any time from Settings → Billing. Changes are prorated immediately.

Yes — the Team plan ($99/mo) includes 5 seats with additional seats at $15/month each. The team owner manages billing, invites members by email, and assigns roles (Owner, Admin, Member, Viewer). Each role has different permissions — for example, Viewers can see reports but cannot run scans. Team members get full Pro features through the owner's subscription — no separate payment needed.

Yes — the referral program is available to Pro and Team subscribers (owners and admins only). Go to Settings → Referral to get your unique referral link. When someone signs up using your link and subscribes to a paid plan, you receive a credit equal to 1 free month of your current plan applied to your next invoice.

No — each account is eligible for one 7-day free trial. If you've previously had a trial or paid subscription (on any plan), new subscriptions will start billing immediately without a trial period. This applies whether you're switching from Pro to Team or vice versa.

Go to Settings → Billing → Manage Subscription. You can cancel, upgrade, or downgrade anytime. Cancellations keep your access until the end of your billing period. Plan changes take effect immediately with prorated billing. No cancellation fees.

Yes — every finding is mapped to SOC2 Trust Service Criteria, ISO 27001 Annex A controls, OWASP Top 10, and CWE. Visit the Compliance page to see your coverage across all controls. Note: compliance mappings are informational — they help you understand your security posture but are not a substitute for a formal compliance audit.

AI Code Security Scanner for Cursor, Lovable, Bolt | XploitScan