every patch tells a story vulnerability.
Read the
patch.
Ship the
proof.
// Automated vulnerability analysis across 41k+ open-source projects.
A living plugin
Running in production. Tens of thousands of installs.
Patch diff analysis
Reduce multi-thousand-line commits to the few hunks that actually move the security needle.
Zero-day detector
Pattern-match CWE signatures against uncommitted code before an advisory is ever written.
Rule generator
Derive grep/semgrep rules from verified vulnerabilities. Run them across your entire library.
PoC synthesis
AI drafts a reproducer from the patch. Reviewer verifies. Report shipped.
How the pipeline reads a patch
Reduce
The average security patch is buried under formatting, tests, vendored assets. We strip those noise hunks and keep what alters control flow, input handling, or crypto.
Match
Each remaining hunk runs against a CWE signature bank — taint analysis for injections, auth-check elisions, race windows, and crypto misuse.
Reason
Claude Haiku reviews reduced hunks with CWE context and the project's own utility functions. It writes a one-paragraph verdict and a confidence score.
Ship
A reviewer approves. PatchLeaks emits a CVE-ready writeup, a PoC request payload, detection rules, and a KEV flag — all from one pull request.
Live advisory feed
| CVE | Severity | Target | Class | Age | — |
|---|---|---|---|---|---|
| Loading live feed… | |||||
Point it at a repo. Read the report.
Free for open-source projects. API available for security teams. No telemetry beyond what we say.