every patch tells a story vulnerability.
Read the
patch.
Ship the
proof.
// Self-hosted AI-powered patch analysis. GitHub repos, WordPress plugins, local code.
A living plugin
Running in production. Tens of thousands of installs.
Patch diff analysis
Reduce multi-thousand-line commits to the few hunks that actually move the security needle.
Zero-day detector
Pattern-match CWE signatures against uncommitted code before an advisory is ever written.
Rule generator
Derive grep rules from verified vulnerabilities. Run them across your entire library.
PoC synthesis
AI drafts a reproducer from the patch. Reviewer verifies. Report shipped.
Live WordPress feed
Pulls fresh advisories from the Wordfence API. Auto-PatchDiff scheduler diffs new plugin releases on a cron.
InputTracer · PHP
Walks each variable backward through the AST until it confirms a user-controlled origin. Non-user-input candidates dropped before AI.
Wrapper unwrap · 3-iter
Identifies declared defense calls, follows wrapper chains to the native implementation, emits a verdict with structured evidence.
Endpoint reachability
For WordPress plugins: verifies whether a vulnerable function is actually reachable from REST, AJAX, or admin pages. Auth-level surfaced.
How Products mode analyzes a patch
Reduce
The average security patch is buried under formatting, tests, vendored assets. We strip those noise hunks and keep what alters control flow, input handling, or crypto.
Match
Each remaining hunk runs against a CWE signature bank — taint analysis for injections, auth-check elisions, race windows, and crypto misuse.
Reason
Claude Haiku reviews reduced hunks with CWE context and the project's own utility functions. It writes a one-paragraph verdict.
Ship
A reviewer approves. PatchLeaks emits a CVE-ready writeup, a PoC request payload, detection rules, and a KEV flag — all from one pull request.
How Zero-Day mode finds vulnerabilities
Pattern match
CWE-specific grep + sink rules sweep the codebase. Thousands of files filtered to targeted matches.
Taint trace
InputTracer (PHP) follows each variable backward through the AST to verify it originates in user input. Non-user-input matches discarded.
Initial pass AI
Quick triage on grep-matched lines only. Drops obvious false positives before any deep scan.
Deep scan AI
Full-file analysis with function-level tree-sitter context. Reasons about taint paths and missing safeguards.
Detection
Parses vulnerability blocks, verifies declared safeguards, deduplicates findings across files.
Defense check
3-iteration loop unwraps wrapper functions to native implementations. Final verdict carries structured evidence.
Live advisory feed
| CVE | Severity | Target | Class | Age | — |
|---|---|---|---|---|---|
| Loading live feed… | |||||
Point it at a repo. Read the report.
Free, open-source, self-hosted.