Demos / Code Security Audit

Code Security Audit

Three scanners running in parallel against a fictional payments-api repo. SAST, secret detection, and dependency CVE check โ€” surfaced with line numbers, redacted snippets, and exact upgrade commands.

Demo Scenario
github.com/quillfinance/payments-api
๐Ÿ“ฆ Node.js + TypeScript monorepo ๐Ÿ’ณ Stripe + custom tokenization ๐Ÿ”„ 1,243 files ยท 1,847 deps

Quill Finance's payments-api is the hot path โ€” it tokenizes cards, calls Stripe, and writes to the customer vault. The CTO wants a security review before the next release. Traditional code audits run $5โ€“15k and take 2โ€“3 weeks; the developers usually just hope for the best and ship.

AgentAegis runs three industry-standard scanners in parallel: trufflehog for hardcoded secrets, Semgrep for code-level vulnerabilities (SQL injection, XSS, missing auth, weak crypto), and trivy for known CVEs in dependencies. The output is a unified findings list with exact line numbers, redacted secret previews, severity ratings, and the literal upgrade commands to fix dependencies.

$2.00 in tool calls, 8 seconds, and you find out two AWS keys are live in production before lunch.

Ready to scan
secret_scan
Secret Detection
sast_scan
Static Analysis
dependency_audit
Dependency CVEs
Synthetic data ยท ~8 seconds