43 analyzers scan your code for security vulnerabilities, architecture violations, AI-era threats (prompt injection, vibe-coded patterns), supply-chain risks (GitHub Actions, Dockerfiles, K8s, git history), and compliance gaps. Per-endpoint risk composition (auth × taint × reachability) — `/api/export · unauthenticated + tainted = critical`. Results appear directly in your PR.
Trusted by engineering leaders replacing Semgrep + SonarQube + Snyk + StepSecurity + GitGuardian with one GitHub-native tool. SOC 2 security evidence on every PR. Scales from solo developers to 300-repo multinationals.
Your code never leaves your GitHub runners. Zero third-party access.
Docker container on your own GitHub Actions runners. Source code is never transmitted, stored, or seen by PullGuard servers. Data-residency and air-gapped-friendly by design.
SOC 2 (8 controls), HIPAA Technical Safeguards, PCI DSS 4.0, NIST 800-53 Rev 5, ISO 27001:2022 — PASS / CONCERN / FAIL per control with AICPA / NIST citation text on every PR.
1,800+ automated tests back every capability on this page. CI rejects releases that drift from this marketing. 100% OWASP Top 10 parity verified by 18/18 fixtures vs Semgrep Pro.
Business Source License 1.1 → Apache 2.0 in 2030. Enterprise MSA with reverse-engineering prohibition + DPA. Audit-log export, SSO (SAML / OIDC), 4-hour SLA for Enterprise.
✓ Every capability claim on this page is backed by a runnable test. Verify any of it in CI — not marketing copy, auditable code.
Every pull request is scanned automatically. Findings include file, line number, severity, and remediation steps.
/api/export · unauthenticated + tainted = critical/pullguard ignore <rule-id> opens a follow-up PR linking the original finding for audit trailMost teams need Semgrep for SAST + SonarQube for quality + Snyk for CVEs. PullGuard combines all three.
✓ Verified parity against 8 competitor categories (73 fixtures) — 100% OWASP parity with Semgrep Pro (18/18)
| Capability | PullGuard | Semgrep | SonarQube | Snyk |
|---|---|---|---|---|
| OWASP Top 10 detection | 15 checks | Pro ($) | Enterprise ($) | Yes |
| Inter-procedural taint | N-hop BFS | Pro ($) | Enterprise ($) | Yes |
| Code quality analysis | 13 analyzers | No | Core | No |
| Dependency CVE scanning | 5 ecosystems | No | No | Core |
| Cost estimation | $/finding | No | No | No |
| SOC 2 security evidence | 8 controls | No | Enterprise ($) | No |
| Multi-framework compliance (HIPAA / PCI / NIST / ISO 27001) | All 4 | No | No | No |
| AI code detection | 5-signal | No | No | No |
| Self-hosted / air-gapped | Docker (static key required) | Yes | Yes | Cloud only |
PullGuard surfaces the right information for the right stakeholders — so procurement, security review, and rollout happen in parallel, not in sequence.
100% OWASP Top 10 parity with Semgrep Pro. Cross-file N-hop taint tracking across 7 languages. Pwn-request, script injection, and token over-permissions detection — top CI/CD supply-chain vectors. Dependency CVE scanning across 5 ecosystems, offline-capable. Replaces Semgrep + Snyk + StepSecurity + GitGuardian with one tool, one install, one invoice.
Dollar amounts on tech debt ("$560K to fix everything"). Grade trends over time with ETA-to-Grade-A predictions. Knowledge-silo risk flags single-contributor files. Breaking-change detection with caller blast-radius. AI-generated code detection catches vibe-coded patterns. Budget conversations backed by per-finding estimates — not vibes.
Five compliance frameworks on every PR: SOC 2 (8 controls), HIPAA Technical Safeguards, PCI DSS 4.0, NIST 800-53 Rev 5, ISO 27001:2022. PASS / CONCERN / FAIL per control with AICPA / NIST citation text — continuous Type II-ready evidence. Per-PR posture delta: "CC3.2 CONCERN→PASS ✅". Risk register with 7-day-critical / 30-day-major SLA fields. MSA-ready enterprise contracts with reverse-engineering prohibition + DPA.
Below is the actual Step Summary PullGuard renders in GitHub Actions on every PR. This is a Team-tier scan showing all 43 analyzers running on a well-maintained codebase. The same layout appears for any repo — green when you're clean, with drill-down details when you're not.
| Category | Grade | Findings | Change |
|---|---|---|---|
| Security (15 OWASP checks) | A | 0 | — |
| Supply Chain (Actions + Dockerfile + git history) | A | 0 | — |
| Dependencies (5 CVE ecosystems) | A | 0 | — |
| Code Quality | A | 0 | — |
| Architecture | A | 0 | — |
| Testing | A | 0 | — |
| Compliance (SOC 2) | A | 0 | — |
| AI Code Detection | A | 0 | — |
| Git History | A | 0 | — |
| Type Coverage | A | 0 | — |
| Severity | Count | Est. Fix Cost |
|---|---|---|
| Critical | 0 | $0 |
| Major | 0 | $0 |
| Moderate | 0 | $0 |
| Total | 0 | $0 |
| Control | Status | Evidence |
|---|---|---|
| CC3.1 (Risk Assessment) | ✅ PASS | No unmitigated security findings |
| CC3.2 (Fraud Risk) | ✅ PASS | No hardcoded credentials or historical secrets |
| CC4.1 (Continuous Monitoring) | ✅ PASS | Per-PR scans + trend tracking provide ongoing evidence |
| CC6.1 (Logical Access) | ✅ PASS | No authentication or authorization weaknesses |
| CC6.2 (Authentication) | ✅ PASS | No weak / missing auth on identified endpoints |
| CC6.7 (Cryptographic Controls) | ✅ PASS | No insecure crypto, weak RNG, or timing-attack vectors |
| CC6.8 (Unauthorized Software Prevention) | ✅ PASS | All dependencies current, no unpinned GHA, no risky Dockerfile patterns |
| CC8.2 (Change Impact Analysis) | ✅ PASS | Breaking-change detection + caller blast radius surfaced |
This is the same Step Summary you'll see in your GitHub Actions tab on every PR. Enterprise evaluators: this output renders identically for you during your security-review period — the report shape is a contract, not a teaser.
Self-serve for small teams. Enterprise conversations for larger orgs.
Solo developers & single projects.
Startups & mid-sized engineering teams.
Custom contract available: DPA, MSA with reverse-engineering prohibition + audit rights, customer-managed deployment, bespoke rule sets, dedicated CSM, quarterly vendor-risk review.
Book a 30-min call300+ repos, 100+ developers, regulated industries.
Need more than Team's 10 repos or 20 contributors? Enterprise includes unlimited, dedicated support, and a signed contract. Ask about competitor migration (Semgrep / SonarQube / Snyk) with preserved rulesets.
No account, no email, no credit card. Add one file to your repo.
name: PullGuard on: [pull_request] permissions: contents: read pull-requests: write jobs: scan: runs-on: ubuntu-latest steps: - uses: actions/checkout@v4 with: fetch-depth: 0 - uses: pullguard-dev/pullguard-action@v1 # Free: 14 analyzers. Add license-key for Pro (42 of 43) or Team/Enterprise (all 43 + custom rules + 5 compliance frameworks)
Add the workflow file above to your repo. That's the entire setup.
PullGuard scans automatically. Grade, findings, and cost estimate appear in Actions.
Add a license key secret to unlock all 43 analyzers, taint tracking, supply-chain + IaC checks, and SOC 2 evidence.
Free tier — no account required. Pro/Team/Enterprise: hello@pullguard.dev