Welcome to CodeStax
CodeStax is an AI-powered code security platform that helps development teams find and fix vulnerabilities before they reach production.
How CodeStax Works
What CodeStax Does
CodeStax combines multiple security scanning engines with AI-powered analysis to provide comprehensive code security coverage:
- SAST (Static Application Security Testing) — Find vulnerabilities in your source code across 30+ languages
- SCA (Software Composition Analysis) — Detect vulnerable dependencies and license compliance issues
- Secret Detection — Catch leaked API keys, passwords, and tokens before they’re exposed
- IaC Scanning — Secure your Terraform, Kubernetes, CloudFormation, and Dockerfiles
- PR Code Reviews — AI-powered security reviews on every pull request
Key Features
| Feature | Description |
|---|---|
| Smart & Deep Scans | Choose between fast scans for frequent checks or thorough scans for release preparation |
| AI Remediation | Get AI-generated fix suggestions with code examples for every vulnerability |
| CVSS/EPSS Scoring | Industry-standard vulnerability scoring with real-time exploit prediction |
| Vulnerability Correlation | Automatic deduplication and attack chain detection across scanners |
| Multi-Provider Support | Works with GitHub, Bitbucket, and GitLab repositories |
| PDF Reports | Generate compliance-ready reports (SOC 2, ISO 27001) |
| Team Management | Role-based access control with organization workspaces |
| CI/CD Integration | API keys and webhooks for automated security in your pipeline |
Supported Scanners
| Scanner | Type | What It Finds |
|---|---|---|
| Semgrep | SAST | OWASP Top 10, CWE vulnerabilities across 30+ languages |
| Trivy | SCA | Known CVEs in dependencies across 9 ecosystems |
| Gitleaks | Secrets | API keys, passwords, tokens, private keys |
| Checkov | IaC | Misconfigurations in Terraform, K8s, CloudFormation |
| Hadolint | Container | Dockerfile best practices and security issues |
| Ruff | Linting | Python code quality and security |
| Bandit | SAST | Python-specific security vulnerabilities |
| ESLint | Linting | JavaScript/TypeScript security patterns |
Quick Start
Get started in under 5 minutes:
- Create your account at codestax.co
- Connect your repositories from GitHub or Bitbucket
- Run your first scan and review results
- Set up automated scanning on every push
Need Help?
- Browse this documentation for detailed guides
- Check the FAQ for common questions
- Contact support at support@codestax.co