every patch tells a story vulnerability.

§00 — patch intelligence, from diff to PoC

Read the
patch.
Ship the
proof. // Automated vulnerability analysis across 41k+ open-source projects.

patchleaks.sh ◼ tty 01
CVEs indexed
10,240
Patches parsed
152
PoCs generated
187
Last feed
--:--:--Z
Act I CVE debugging
chapter 01 / 18
v21.5 on disk

A living plugin

Running in production. Tens of thousands of installs.

I CVE debugging
II Zero-day detection
III Verifier sort
commit · upstream
4a8fc23 yoast/wordpress-seo 21.5 → 21.6
183 files · 12 security-sensitive hunks · 4 functions touched
plugins/auth/login.php on disk · v21.5
1// plugins/auth/login.php · v21.5
2public function authenticate($user, $pass) {
3 $q = "SELECT * FROM users WHERE "
4 . "name='" . $user . "' AND "
5 . "pass='" . $pass . "' LIMIT 1";
6 $row = $db->query($q)->fetch();
7 if ($row) {
8 $_SESSION['uid'] = $row['id'];
9 return true;
10 }
11 return false;
12}
CVE-2025-8819 critical
CWECWE-89 · SQL Injection CVSS9.8 · critical vectorAV:N · AC:L · PR:L · UI:N KEVlisted · actively exploited affectedYoast SEO ≤ 21.5 fixed21.6
articles/cve-2025-8819.md ● writing · claude-haiku-4.5
install base
pluginyoast-seo version21.5 downloads13.2M active php>= 7.4
01
02
03
04
05
06
07
08
09
10
11
12
13
14
15
16
17
18
§01

Patch diff analysis

Reduce multi-thousand-line commits to the few hunks that actually move the security needle.

ANALYSIS open
§02

Zero-day detector

Pattern-match CWE signatures against uncommitted code before an advisory is ever written.

ZERO-DAY open
§03

Rule generator

Derive grep/semgrep rules from verified vulnerabilities. Run them across your entire library.

RULES open
§04

PoC synthesis

AI drafts a reproducer from the patch. Reviewer verifies. Report shipped.

OUTPUT open
§02

How the pipeline reads a patch

FOUR STAGES · DETERMINISTIC
stage 01

Reduce

The average security patch is buried under formatting, tests, vendored assets. We strip those noise hunks and keep what alters control flow, input handling, or crypto.

183 files  →  12 hunks  →  4 functions
stage 02

Match

Each remaining hunk runs against a CWE signature bank — taint analysis for injections, auth-check elisions, race windows, and crypto misuse.

CWE-89 · CWE-384 · CWE-352
stage 03

Reason

Claude Haiku reviews reduced hunks with CWE context and the project's own utility functions. It writes a one-paragraph verdict and a confidence score.

confidence 0.94 · model claude-haiku-4.5
stage 04

Ship

A reviewer approves. PatchLeaks emits a CVE-ready writeup, a PoC request payload, detection rules, and a KEV flag — all from one pull request.

writeup · poc.sh · semgrep.yml
§01

Live advisory feed

UPDATED EVERY 60s
CVE Severity Target Class Age
Loading live feed…
10,240
CVEs indexed
152
patches parsed
187
PoCs generated
47
languages supported
--:--:--Z
last feed sync
§ready

Point it at a repo. Read the report.

Free for open-source projects. API available for security teams. No telemetry beyond what we say.

Start a scan → Open dashboard