Platform Features

Everything your application security needs.

codelake is the most comprehensive application security platform available. While other tools focus on one or two scan types, codelake unifies code scanning, dependency analysis, secret detection, infrastructure-as-code checks, API security, compliance automation, and application intelligence into a single platform with correlated risk narratives.

Explore the full feature set below — from detection to remediation, from compliance to developer experience.

Scanning & Detection

Find every vulnerability, across every layer.

Seven specialized scanning engines work together to analyze your code, dependencies, secrets, infrastructure, APIs, and AI-generated patterns. Each scanner feeds into the application context model for correlated risk narratives.

code

Code Scanning (SAST)

Deep static analysis that goes beyond pattern matching. Detects SQL injection, XSS, command injection, insecure cryptography, path traversal, and hundreds more vulnerability patterns. Powered by the Semgrep engine with full support for custom rules tailored to your codebase and frameworks.

package_2

Dependency Scanning (SCA)

Continuously checks all third-party dependencies against CVE databases and security advisories. Full support for npm, Composer, pip, Go modules, Maven, and more. Includes transitive dependency analysis and automatic upgrade recommendations with compatibility scoring.

key

Secret Detection

Finds hardcoded secrets, API keys, tokens, and passwords across your entire codebase and git history. Recognizes 50+ key formats including AWS, Stripe, Firebase, GitHub, OpenAI, and more. High-entropy string detection catches custom secrets that pattern matching misses.

bolt

FreeScan (URL Scanner)

14 automated security checks for any URL in under 30 seconds. No account required. Checks HTTP security headers, SSL/TLS configuration, cookie security, CORS policy, open redirects, exposed files, API key leaks, and technology fingerprinting. Severity grading from A to F with actionable recommendations.

cloud_sync

IaC Scanning

Scans your infrastructure-as-code for misconfigurations and security risks. Full support for Terraform, CloudFormation, Kubernetes manifests, Helm charts, and Dockerfiles. Checks against CIS benchmarks, AWS/Azure/GCP best practices, and custom organizational policies.

api

API Security

Automatic endpoint discovery directly from your source code. Checks every endpoint against the OWASP API Top 10 including BOLA (Broken Object Level Authorization), excessive data exposure, missing authentication, rate limiting gaps, and mass assignment vulnerabilities.

smart_toy

AI Code Risk Detection

Purpose-built for VibeCoded and AI-generated applications. Detects insecure defaults, missing access control, database schemas without ownership checks, tutorial-pattern vulnerabilities, and the systematic gaps that AI scaffolding tools consistently produce. Essential for any team using AI to write code.

Application Intelligence

Understand your application, not just your code.

This is what makes codelake unique. While other scanners analyze files in isolation, codelake builds a living model of your entire application — understanding how data flows, where authentication boundaries exist, how services depend on each other, and where the real risk lies.

Triage & Remediation

From finding to fix, streamlined.

Discovering vulnerabilities is only half the battle. codelake provides the tools to triage, prioritize, assign, and resolve findings efficiently with built-in workflows and AI-powered remediation guidance.

sort

Smart Triage

Split-screen triage interface with findings list on the left and detailed code view on the right. Full status workflow (Open, In Progress, Accepted Risk, False Positive, Resolved) with documented decisions. Filter by severity, scanner type, file path, and assignee. Every triage decision is audit-logged.

auto_fix

AI Remediation Suggestions

For every finding, codelake generates context-aware fix suggestions using AI. Not generic advice — actual code patches applicable to your specific codebase, framework, and coding patterns. Includes explanation of why the fix works and what it prevents. One-click copy for immediate application.

assignment

Security Case Management

Track security incidents from detection to resolution with case IDs, SLA tracking, and escalation workflows. Group related findings into security cases, assign ownership, set deadlines, and track resolution time. Full audit trail for compliance evidence and post-incident review.

Compliance & Governance

Continuous compliance, not annual audits.

codelake maps your security posture to 10 compliance frameworks in real time. No more manual spreadsheets, screenshot evidence, or scrambling before audits. Every scan updates your compliance scores automatically.

verified

Compliance Dashboard

Real-time compliance scores for SOC 2, ISO 27001, PCI DSS, HIPAA, NIST 800-53, NIST CSF, CIS Controls, OWASP Top 10, EU CRA, and DORA. Visual progress per framework, drill-down to individual controls, and automatic evidence collection. Know your compliance posture at any moment.

rule

Policy Engine

Define custom security policies with configurable severity levels and enforcement actions. Set rules that automatically fail builds, block PR merges, or trigger alerts when violated. Supports organization-wide policies and per-project overrides for different risk profiles.

history

Audit Logs

Complete action protocol for every event in the platform. Every scan, triage decision, status change, configuration update, and access event is logged with timestamp, actor, and expandable diffs showing exactly what changed. Immutable, exportable, and searchable.

inventory_2

SBOM Generation

Generate Software Bill of Materials in CycloneDX and SPDX formats. Fully compliant with EU Cyber Resilience Act (CRA) requirements. Includes all direct and transitive dependencies, license information, vulnerability status, and supplier data. Auto-generated with every scan.

approval

Manager Approval Queue

Destructive actions and compliance-relevant decisions require documented approval. Managers see a queue of pending approvals with full context, risk assessment, and audit trail. Supports delegation, escalation timeouts, and automatic reminders for SLA compliance.

Supply Chain Security

Know what's in your software supply chain.

Modern applications depend on hundreds of third-party packages. codelake maps your entire dependency graph, identifies risk hotspots, and ensures license compliance across your full supply chain.

account_tree

Dependency Graph & Risk Assessment

Visual dependency graph showing all direct and transitive dependencies with risk scoring. Identify abandoned packages, maintainer changes, typosquatting risks, and packages with known vulnerabilities deep in the dependency tree. Prioritize remediation based on actual reachability and exploit availability.

gavel

License Compliance

Automatic license detection and compliance checking for every dependency. Define allowed and blocked license types per project. Alerts for copyleft licenses in proprietary projects, license conflicts, and missing license declarations. Exportable license reports for legal review.

Developer Experience

Security that fits your workflow.

codelake meets developers where they work — in the terminal, in the IDE, and in the API. No context switching, no separate dashboards, no friction.

Ready to see the full platform in action?

Start with a free account and connect your first repository. Your first scan results are ready in under 5 minutes. No credit card required.