Skip to main content
CybeDefend offers a multi-layered security solution across your codebase, infrastructure, and third-party dependencies. We combine:
  1. CybeDefend Engine – Aggregates and cross-references results from multiple open-source and proprietary scanners, minimizing duplicates and noise.
CybeDefend Multi-Layer Security

Why Use CybeDefend?

  • Unified Scanning: The CybeDefend Engine merges findings from different tools into a single, concise view.
  • Reduced Noise: Duplicate or overlapping vulnerabilities are identified and consolidated, preventing alert overload.

1. Static Application Security Testing (SAST)

SAST inspects your source code to catch vulnerabilities early in the development process. CybeDefend unifies open-source scanners (e.g., Semgrep) under the CybeDefend Engine.

Supported Languages

LanguagePrimary Scanners
GoCybeDefend Engine & Rules + Opengrep
PythonCybeDefend Engine & Rules + Opengrep
JavaCybeDefend Engine & Rules + Opengrep
JavaScriptCybeDefend Engine & Rules + Opengrep
CCybeDefend Engine & Rules + Opengrep
C++CybeDefend Engine & Rules + Opengrep
C#CybeDefend Engine & Rules + Opengrep
PHPCybeDefend Engine & Rules + Opengrep
RubyCybeDefend Engine & Rules + Opengrep
RustCybeDefend Engine & Rules + Opengrep
IAC Security Analysis

2. Infrastructure as Code (IAC) Security

IAC scanning ensures that cloud and container configurations adhere to best practices. The CybeDefend Engine works with scanners like Checkov, Trivy, and KICS to identify misconfigurations. Unlike SAST, enabling AI Mode for IAC does not provide line-level dataflow (which is primarily for code), but the Engine still handles intelligent vulnerability matching and deduplication.

Supported Technologies

CategoryIAC TypesScanning Tools
Cloud ConfigurationsTerraform, CloudFormation, AWS CDK, Azure RM, Helm, KubernetesCybeDefend Engine + Checkov, KICS, Trivy
Serverless SecurityAWS Lambda, Azure FunctionsCybeDefend Engine + Checkov, KICS
Container SecurityDockerfiles, Docker ComposeCybeDefend Engine + Trivy, KICS
OpenAPI / gRPC.json, .yaml, .protoCybeDefend Engine + KICS
IAC Security Analysis
IAC misconfigurations can lead to severe breaches. The CybeDefend Engine identifies issues in your code, saving you from manually piecing together results from multiple scanners.

3. Software Composition Analysis (SCA)

SCA detects vulnerabilities in third-party libraries and open-source dependencies. CybeDefend uses the CybeDefend Engine combined with GitHub Advisories to identify known flaws in your dependencies.

SCA Scanning Tools

EngineExternal Advisory Source
CybeDefend EngineGitHub Advisories

Files & Package Managers

Below is a non-exhaustive list of key files we inspect:
Language/FrameworkFile Examples
Nodenpm-shrinkwrap.json, yarn.lock, pnpm-lock.yaml, pnpm-lock.yml, bun.lock, bun.lockb, deno.lock, libman.json, package.json, package-lock.json
Javagradle.lockfile, build.gradle, .jar, .war, .ear, pom.xml
SwiftPackage.resolved, Podfile.lock
.NET (NuGet).deps.json, packages.lock.json, Packages.props
Kotlingradle.lockfile
Elixirmix.lock
C/C++conan.lock
Scalabuild.sbt, plugins.sbt, dependencies.scala, libraries.scala, .sbt.lock
Clojuredeps.edn
Genericcomposer.json, requirements.txt, Pipfile, Pipfile.lock, poetry.lock, pyproject.toml, Gemfile, Gemfile.lock, Cargo.toml, Cargo.lock, go.mod, pubspec.yaml, pubspec.lock, packages.config, Package.swift, rebar.config, rebar3.config, rebar.lock, rebar3.lock, .gemspec, .csproj, .nuspec, .yml, .yaml
If you use special file names or custom project layouts, you can configure file-patterns in the CybeDefend dashboard to ensure they are recognized and scanned.

Related: Scan Parameters · Create a Project · Cybe Analysis
I