New · Live audit of your agent in 60 seconds

Security for AI agents
and the code that ships them.

Guardra audits your AI agents — prompts, memory, tools, and outputs — and the source code that builds them. Catch prompt injection, leaked secrets, tool abuse, hallucinated APIs, and CVEs before production.

Built for CTOs, AppSec leads & Heads of Platform at AI-native companies

  • 1.4M agents audited
  • OWASP LLM Top 10 coverage
  • SOC 2 · ISO 27001
  • Open-source SDK · Python + Node
guardra · auditing support-bot
live
Findings
217 total
  • Prompt injection via user-provided doc

    agent/support-bot · tool=read_file

    Critical
  • API key leaked to agent memory

    memory/session-a4e2 · turn #14

    Critical
  • Unbounded tool call — send_email to *

    tools/email.py:42

    High
  • Hallucinated API endpoint /v2/orders/wire

    agent output · trace #8912

    High
  • SQL injection in /api/reports/export

    pages/api/reports/export.ts:88

    High

Auto-fix ready

194 of 217 fixable · ships as PR

Trusted across regulated industries

NorthBankVercoreHelios HealthQuantraPalladium LabsStratosphereIroncladAperture CloudMeridian CapitalClearwaterHalcyonSentinel Grid

4.9/5

G2 · 412 reviews

4.8/5

Gartner Peer Insights · 198 reviews

9.4/10

TrustRadius · 107 reviews

Certified & compliant

  • SOC 2 Type II
  • ISO 27001
  • ISO 27017
  • ISO 27018
  • PCI-DSS L1
  • HIPAA
  • GDPR
  • FedRAMP Ready
  • StateRAMP
  • CSA STAR

Penetration-tested quarterly by external firms

Industry recognition

Gartner

Cool Vendor

AppSec 2025

Forrester

Wave Leader

SAST Q1 2026

G2

Leader

Winter 2026

CSA

Global Leader

DevSecOps 2025

Cyber Defense

Editor's Choice

2025

Five attack surfaces. One platform.

Every AI agent has the same five surfaces an attacker will touch. Guardra audits all five, continuously — and fixes what it finds.

01

Prompts

System prompts, user inputs, retrieved context, few-shot examples.

  • Prompt injection (direct & indirect)
  • Jailbreaks & roleplay attacks
  • PII exposure in system prompts
  • Prompt leakage via model outputs

02

Memory & Context

Long-term memory stores, conversation history, RAG vector data.

  • Cross-session memory bleed
  • Secrets persisted to memory
  • Poisoned RAG documents
  • Unbounded memory growth

03

Tools & Actions

Every function call your agent makes — APIs, filesystems, emails, code exec.

  • Over-privileged tool scopes
  • Unbounded actions (send_email to *)
  • Tool chaining privilege escalation
  • Confused-deputy attacks

04

Outputs

Agent responses delivered to users, APIs, or downstream systems.

  • Hallucinated endpoints & APIs
  • Unsafe code suggestions
  • Markdown / link injection
  • Data exfiltration channels

05

Your code

The repos that ship your agent and everything around it.

  • Leaked API keys & secrets
  • CVEs in dependencies
  • SAST / IaC misconfig
  • Insecure AI-generated code (46% of PRs)

Paste a prompt. See what Guardra catches.

This runs a subset of our detectors in your browser — zero data leaves your device. The full engine runs 12,000+ checks plus LLM-as-judge.

Try examples
132 chars · stays local
Findings

Click Run audit to see live findings.

Five lines of code. Production-grade security.

SDKs for Python and Node. REST & GraphQL. A single-binary CLI. A full dashboard. Pick whichever fits your stack — all four talk to the same engine.

$ pip install guardrainstall
from guardra import Guardra

g = Guardra(api_key="grd_...")

# Wrap every LLM call — zero code changes to your agent
result = g.audit(
    agent="support-bot",
    messages=conversation,
    tools=tool_calls,
    memory=memory_snapshot,
)

if result.critical:
    raise g.BlockedByPolicy(result.reason)
p50 < 40msasync-safefail-open on errorstreaming compatibleOpenAI / Anthropic / LangChain / LangGraph / CrewAI

SDK

Drop-in for Python & Node · async-first · zero dependencies

REST + GraphQL

Signed webhooks · OpenAPI spec · Terraform provider

CLI

Single binary · air-gap friendly · CI/CD gate built-in

Dashboard

Live traces · replay · team RBAC · audit export

Try the live demo

Built for developers. Shipped on GitHub.

Open-source SDKs. Signed releases. Real engineers can read the code before they install it.

pip
Python· v2.4.0 · 680K downloads/mo
$ pip install guardra
npm
Node· v2.4.0 · 412K downloads/mo
$ npm install @guardra/sdk
curl
CLI· macOS · Linux · Windows · Docker
$ curl -fsSL https://guardra.ai/install | sh
go
Go· v2.4.0 · signed releases
$ go install github.com/guardra/guardra-cli@latest

github.com/guardra

Open-source SDKs & rule packs

47.2k
  • guardra/guardra-py

    Official Python SDK

    18.2k
  • guardra/guardra-js

    Official Node / TypeScript SDK

    12.7k
  • guardra/guardra-cli

    Single-binary CLI · air-gap friendly

    9.4k
  • guardra/detectors

    Open rule packs — OWASP LLM Top 10, CWE, MITRE

    6.8k
All releases signed with SigstoreSLSA Level 3 build provenanceReproducible buildsSBOM published per release

Every line of code your team ships is a potential liability.

The AI era accelerated software delivery by 10x — and shipped vulnerabilities with it. Hard-coded API keys, leaked secrets, LLM-generated insecure code, and supply-chain backdoors are now the #1 driver of enterprise loss.

$10.5T

annual global cybercrime cost by 2025

Source · Cybersecurity Ventures

$4.88M

average cost of a single data breach in 2024 — up 10% YoY

Source · IBM Cost of a Data Breach 2024

12.8M

secrets leaked to public repos in a single year — 39 every minute

Source · GitHub Secret Scanning Report

40%

more security vulnerabilities in AI-generated code vs human-written

Source · Stanford HAI

Recent incidents

It's not theoretical. It's happening weekly.

2023

Toyota

2.15M users exposed

A cloud misconfiguration left customer telematics data public for 10 years. Discovered only after external audit.

2023

Samsung

Proprietary chip source code

Engineers pasted confidential code into ChatGPT three times in 20 days. Banned generative AI company-wide as a result.

2023

MOVEit / Progress

2,600+ orgs · 93M records

A single zero-day in file-transfer software cascaded into one of the largest supply-chain breaches on record.

2024

Change Healthcare

$2.9B recovery cost

Ransomware attack on UnitedHealth subsidiary. 100M Americans' health data exposed. Traced to a server missing MFA.

2020

SolarWinds

$100B+ estimated damages

Nation-state actors planted malicious code in a trusted build pipeline. 18,000 customers compromised downstream.

2023

CircleCI

All customer secrets rotated

An engineer's laptop was compromised via info-stealer malware, exfiltrating session tokens for the CI platform itself.

The AI Multiplier

73% of orgs ship AI-generated code. 38% have zero security controls for it.

AI coding assistants wrote 46% of all code merged in 2024. They hallucinate secrets, suggest deprecated crypto, and reintroduce 5-year-old CVEs at scale. Traditional scanners were not built for this velocity. Guardra was.

Sources · McKinsey State of AI 2024 · GitHub Octoverse · Veracode State of Software Security

Average org, unscanned
  • Leaked secrets in commits1 in 9
  • Critical CVEs in dependencies217 avg
  • Days to detect a breach194
  • Breach cost if leaked via code$4.45M

One platform to find, fix, and prove your agents and code are secure.

Guardra AI replaces a stack of SAST, SCA, secret scanners, red-team tooling, and compliance spreadsheets — with a single engine that ships real fixes.

LLM01

Prompt-injection defense

Direct + indirect injection detection trained on the largest adversarial prompt corpus in the industry. Catches attacks signature engines miss.

Forensics

Agent trace replay

Send us OpenTelemetry traces or LangSmith / LangFuse exports. Guardra replays every span and surfaces the exact step that went wrong.

Guardrails

Tool-call policy engine

Least-privilege scopes per tool, per user, per agent. Rate-limit, require human-in-the-loop, or block fan-out actions automatically.

Zero exposure

Secret & identity scanning

Detects leaked keys and credentials across prompts, memory, logs, commits, and artifacts. Rotates compromised secrets in one click.

SAST · SCA

Full-stack code audit

SAST + DAST + SCA + IaC across 40+ languages. Extra-sensitive to AI-generated code, which carries 40% more vulnerabilities.

Auto-fix

AI remediation engine

Every finding ships with a production-ready patch, a regression test, and a clean diff. Review as a PR or auto-gate at CI.

Audit-ready

Compliance, generated

SOC 2, ISO 27001, PCI-DSS, HIPAA, GDPR, and EU AI Act controls mapped automatically. Auditor-ready evidence on demand.

Shift-left

Policy-as-code gating

Block unsafe agent deploys and risky PRs at the source. Severity thresholds, owner routing, waiver workflows — all in Git.

Drop-in

Native to your stack

OpenAI · Anthropic · LangChain · LangGraph · CrewAI · LlamaIndex · Bedrock · Vertex. GitHub / GitLab / Bitbucket. SSO + SCIM.

SBOM · SLSA

Supply-chain defense

SBOM generation, dependency confusion detection, LLM-suggested typosquat protection, and signed-build enforcement.

Fast by design

Runs in minutes

p50 < 40ms inline audits. Full deep scans under 10 minutes. Zero noise — findings ranked by real exploitability, not CVSS.

Private by default

Zero data retention

Scans run in ephemeral isolated enclaves. Your source and traces never persist unless you ask. CMEK / HSM on Premium.

Every framework. Every standard. Every vulnerability class.

Mapped to the industry standards your auditors, regulators, and board already know.

OWASP LLM Top 10 (2024)

Native detection for every category — AI agents, prompts, tools

  • LLM01Prompt Injection
    100%
  • LLM02Insecure Output Handling
    100%
  • LLM03Training Data Poisoning
    94%
  • LLM04Model Denial of Service
    100%
  • LLM05Supply Chain Vulnerabilities
    100%
  • LLM06Sensitive Information Disclosure
    100%
  • LLM07Insecure Plugin Design
    100%
  • LLM08Excessive Agency
    100%
  • LLM09Overreliance
    92%
  • LLM10Model Theft
    96%

OWASP Top 10 Web (2021)

100% detection coverage across all 10 categories

  • A01Broken Access Control
    100%
  • A02Cryptographic Failures
    100%
  • A03Injection
    100%
  • A04Insecure Design
    96%
  • A05Security Misconfiguration
    100%
  • A06Vulnerable Components
    100%
  • A07Auth & Identity Failures
    100%
  • A08Software & Data Integrity
    100%
  • A09Logging & Monitoring
    94%
  • A10Server-Side Request Forgery
    100%

CWE Top 25 (2024)

Every Most Dangerous Software Weakness covered

CWE-79 XSSCWE-89 SQLiCWE-22 Path TraversalCWE-352 CSRFCWE-787 Out-of-bounds WriteCWE-20 Improper InputCWE-125 Out-of-bounds ReadCWE-78 OS CommandCWE-862 Missing AuthorizationCWE-269 Improper PrivilegeCWE-502 DeserializationCWE-287 Improper AuthCWE-476 NULL PointerCWE-918 SSRFCWE-863 Incorrect AuthzCWE-306 Missing AuthCWE-190 Integer OverflowCWE-94 Code InjectionCWE-434 Unrestricted UploadCWE-522 Insufficient CredsCWE-732 Incorrect PermsCWE-611 XXECWE-798 Hard-coded CredsCWE-276 Default PermsCWE-200 Information Exposure

MITRE ATT&CK

Enterprise & Cloud matrices — 213 techniques mapped

  • Initial Access14
  • Execution18
  • Persistence22
  • Privilege Escalation15
  • Defense Evasion43
  • Credential Access19
  • Discovery31
  • Lateral Movement11
  • Collection17
  • Exfiltration9
  • Impact14

Languages & IaC

40+ first-class parsers · native AST analysis

TypeScriptJavaScriptPythonGoRustJavaKotlin
SwiftC#CC++RubyPHPScala
SolidityDartElixirClojureGroovyRLua
TerraformCloudFormationPulumiKubernetes YAMLDockerfileHelmAnsible

Updated weekly · request a parser →

A single pane of glass for your entire security posture.

Risk in dollars, not CVSS scores. Compliance drift tracked live. Every repo, every commit, every fix — measured, ranked, and ready to show the board.

app.guardra.ai / dashboard / acme-platform
Risk score
18−78%

30d trend · lower is better

Exposure saved
$12.4M+$1.8M

Breach cost avoided this quarter

Auto-fix PRs merged
1,284+412

Last 30 days

MTTR
11m−94%

Mean time to remediation

Risk trend · 30 days

18 / 100

78% this month
Mar 18Apr 17
Findings by severity
  • Critical12
  • High47
  • Medium83
  • Low75
Top repositories
12 repos
RepoScore30dPRsCritical
acme-platform/api94 / 100+6230
acme-platform/web88 / 100+12171
acme-platform/mobile72 / 100-392
acme-platform/iac96 / 100+240
Compliance posture
98%
SOC 2
Controls mapped
95%
ISO 27001
Controls mapped
91%
PCI-DSS
Controls mapped
100%
HIPAA
Fully compliant

A seven-stage pipeline that runs in minutes.

Built by practitioners. Grounded in open standards. Engineered to be boring in production — which is exactly what security infrastructure should be.

  1. 01

    Connect

    OAuth into GitHub / GitLab / Bitbucket / Azure DevOps. Scoped, read-only, SCIM-provisioned. 60 seconds from click to first scan.

  2. 02

    Ingest

    Guardra streams your source, dependencies, IaC, and commit history into a short-lived enclave. Nothing persists.

  3. 03

    Analyze

    12,000+ deterministic detectors run first — grounded in CWE/OWASP. Then our security-tuned LLM layer reviews business logic for patterns signature engines miss.

  4. 04

    Prioritize

    Findings are ranked by real exploitability: reachability analysis, blast-radius scoring, and exposure context. No noise.

  5. 05

    Remediate

    Each finding ships with a production-ready patch + a regression test. A secondary model adversarially reviews the fix before it's offered to you.

  6. 06

    Gate

    Policy-as-code blocks risky merges at the source. Severity thresholds, owner routing, waiver workflows — all in Git.

  7. 07

    Prove

    Every finding, fix, and waiver is logged, signed, and exportable. Auditor-ready evidence packages for SOC 2, ISO, PCI, HIPAA — generated on demand.

Built with the same paranoia your security team would build it.

Designed by engineers from CrowdStrike, Google Project Zero, and NCC Group. Every architectural choice was made to minimize blast radius and cost.

Your agent

SDK · REST · CLI · webhook

Guardra enclave

Queue → workers → LLM-judge

Your dashboard

Findings only · no raw data

01

Signed submit

mTLS · per-tenant key · rate-limited

02

Async analyze

12k detectors + judge · OTEL-traced

03

Findings emitted

Raw data discarded · cert of destruction

Deployment

Guardra Cloud (us/eu/apac), inside your VPC, on-prem, or airgapped. FedRAMP Moderate and IL4 environments available.

  • Ephemeral isolated enclaves

    Scans execute in single-tenant, short-lived enclaves inside your cloud region. They terminate and self-destruct within minutes.

  • Zero source retention

    Source code is streamed, analyzed in memory, discarded. Findings — not code — are what persists. BYOK + HSM on Premium.

  • Signed, reproducible builds

    Every Guardra release is signed, SLSA-3 attested, and published to Sigstore. Verify exactly what's running.

  • Mutually-authenticated runtime

    mTLS everywhere, short-lived certs, per-tenant encryption keys. Control-plane access is fully audit-logged.

Backend engineered to scale

The stuff real buyers ask about.

Event-driven ingest

Traces and scans enter a Redis-backed queue with at-least-once semantics. Workers are horizontally auto-scaled; bursty traffic never blocks your agents.

Worker separation

Ingest, analysis, LLM-as-judge, and remediation each run on isolated worker pools with their own rate limits and blast-radius controls.

End-to-end observability

OpenTelemetry traces every span through the pipeline. You see latency, token usage, and detector hits per agent in real time.

Rate limiting & backpressure

Token-bucket limits per API key, per tenant, per detector. Fail-open option keeps your agents running if Guardra is ever degraded.

LLM cost guardrails

Budgets per project and per environment. Alerts on spend anomalies. Automatic model routing (cheap → expensive) based on finding severity.

Drops into the stack you already have.

60+ native integrations. Webhook and REST API for anything we haven't built yet. SCIM provisioning. SSO on every plan.

Source code

  • GGitHub
  • GGitLab
  • BBitbucket
  • ADAzure DevOps
  • GGitea
  • PPerforce

CI / CD

  • GAGitHub Actions
  • GCGitLab CI
  • JJenkins
  • CCircleCI
  • BBuildkite
  • AArgoCD

Identity & SSO

  • OOkta
  • AAAzure AD
  • GWGoogle Workspace
  • OOneLogin
  • DDuo
  • JJumpCloud

Ticketing & workflow

  • JJira
  • LLinear
  • AAsana
  • SServiceNow
  • MMonday
  • SShortcut

Alerting & chat

  • SSlack
  • MTMicrosoft Teams
  • PPagerDuty
  • OOpsgenie
  • DDiscord
  • EEmail

Cloud & observability

  • AAWS
  • AAzure
  • GGCP
  • DDatadog
  • SSplunk
  • EElastic

Secrets & vaults

  • HVHashiCorp Vault
  • ASAWS Secrets Mgr
  • AKAzure Key Vault
  • GSGCP Secret Mgr
  • 11Password
  • DDoppler

Container & IaC

  • DDocker
  • KKubernetes
  • TTerraform
  • PPulumi
  • CCloudFormation
  • HHelm

Need something custom?

Full REST + GraphQL API · signed webhooks · CLI · Terraform provider

Read the docs

Real teams. Measurable outcomes.

The numbers below are from production customers. No rounded-up testimonials — just before and after.

Financial Services

NorthBank

2,400 engineers · 1,100 repos

Replaced 4 legacy scanners and passed SOC 2 Type II renewal in 72 hours.

NorthBank was spending $1.8M/yr across Snyk, SonarQube, GitGuardian, and a GRC consultancy — and still missed a leaked Stripe key in a test repo that led to a regulator inquiry. Guardra consolidated all four tools and auto-generated their entire SOC 2 evidence package.

We shut down our entire appsec tooling committee. Guardra just does the work — and the auditors are happier than they've ever been.
Priya Menon · VP Engineering

Tooling cost

Before

$1.8M/yr

After

$310K/yr

−83%

Mean time to fix

Before

14 days

After

9 min

−99.9%

False positives

Before

71%

After

4%

−94%

Audit prep time

Before

6 weeks

After

2 days

−95%

Healthcare

Helios Health

HIPAA · 48M patient records

Caught a 6-year-old credential leak within 4 minutes of onboarding.

On day one, Guardra surfaced an AWS root key committed to a legacy research repo in 2019. The key had been rotated on paper — but was still active. CISO estimates the leak prevented a $40M+ HIPAA breach event.

Four minutes. That's how long it took Guardra to find something four pen-tests and two auditors had missed.
Ayesha Rahman · CISO

Exposure prevented

Before

After

$40M+

avoided

Coverage

Before

37 repos

After

312 repos

+744%

Critical findings

Before

unknown

After

18 triaged

day 1

Engineer hours saved

Before

After

1,200/qtr

reallocated

AI / Platform

Vercore

Series C · 400 engineers

Shipped 40% faster by putting Guardra in front of every merge.

Vercore's engineers ship 300+ PRs/day, 46% of which contain AI-generated code. Before Guardra, their security team was a bottleneck. Now, 91% of findings are auto-fixed before a human sees them — and security reviews happen only on the 9% that matter.

The auto-fix PRs are uncanny. 9 out of 10 merge without a human touching them — and the one that doesn't is usually the one that matters.
Daniel Craig · Staff Security Engineer

PR merge velocity

Before

+0%

After

+40%

faster

Auto-fixed findings

Before

0%

After

91%

automated

Security team size

Before

stable

After

stable

no backfill needed

Vulns to production

Before

~8/wk

After

0.3/wk

−96%

Verified by the people who actually use us.

806 verified reviews across G2, Gartner Peer Insights, TrustRadius, and Capterra.

G2

4.9/5

412 reviews

Leader · Winter 2026

Gartner Peer Insights

4.8/5

198 reviews

Customers' Choice 2025

TrustRadius

9.4/10

107 reviews

Top Rated 2025

Capterra

4.9/5

89 reviews

Best Ease of Use

G2

We evaluated Snyk, Semgrep, and Guardra head-to-head. Guardra found 3x more genuine vulnerabilities with a fifth of the false positives. The auto-fix feature alone saved my team 20+ hours per week.

Director of Security, Mid-Market Fintech

Gartner Peer Insights

The compliance evidence export is a game-changer. What used to take a six-person team six weeks for SOC 2 prep now takes two days. Our auditor specifically asked who we were using.

CISO, Healthcare · $2B+ Revenue

TrustRadius

Finally, a security tool engineers don't hate. The PRs are clean, the tests actually work, and the explanations are useful. Our merge velocity went UP after installing a security scanner — first time I've ever seen that.

VP Engineering, AI Platform

G2

The MITRE ATT&CK mapping and CWE coverage are the best in the market. I used to maintain our own rule library — deleted it the week we went live with Guardra.

Staff AppSec Engineer, E-commerce

Gartner Peer Insights

Airgapped deployment worked on the first try. FedRAMP readiness posture is clearly documented. Customer-managed encryption keys are first-class, not an afterthought.

Principal Engineer, Defense Contractor

Capterra

Onboarded 312 repositories in 90 minutes. Found a leaked AWS access key from 2019 in the first scan. It paid for itself on day one.

Head of DevSecOps, SaaS Platform

We don't just detect threats. We publish them.

Our in-house research team has disclosed 40+ CVEs to vendors since 2023, authored industry-reference reports, and briefed the US CISA, ENISA, and the UK NCSC.

Recent disclosures

CVEs coordinated by Guardra Labs

40+ since 2023
  • CRITICALCVSS 9.8

    Authentication bypass in popular OAuth library

    oauth-toolkit v3.x · 2.1M weekly downloads

    CVE-2026-11284Feb 2026
  • HIGHCVSS 8.6

    Prototype pollution in a Top-50 npm package

    (coordinated disclosure) · 410K dependents

    CVE-2025-98712Dec 2025
  • CRITICALCVSS 9.1

    Deserialization RCE in a Fortune-500 CI plugin

    (coordinated disclosure) · Enterprise CI/CD

    CVE-2025-74419Oct 2025
  • HIGHCVSS 8.1

    LLM prompt-injection → data exfiltration

    Commercial AI coding assistant · Industry-wide

    CVE-2025-51007Jul 2025
Annual Report

State of Code Security 2026

4.2M repos analyzed. 12.8M secrets leaked. The data on where modern engineering teams are getting it wrong — and what's working.

Download report (PDF · 48 pp)
Threat Brief

Attacking AI-generated code at scale

Our red team ran 1,200 prompts through the top 5 LLM coding assistants. 46% produced code with at least one OWASP Top 10 issue.

Read the brief
Research

Supply-chain typosquatting in the LLM era

AI assistants are increasingly suggesting malicious look-alike packages. We identified 347 active typosquats in the npm ecosystem alone.

Read the paper
4.2M

lines scanned / day

94%

findings auto-fixed

<10min

time to first report

0

source code retained

Why teams are consolidating on Guardra.

Most customers replace 3–5 tools on day one. Here's the honest comparison.

Capability
Guardra
SnykSemgrepSonar
Static analysis (SAST)
Dependency scanning (SCA)
Secret scanning (git history)
AI-driven auto-fix PRs
Business-logic vulnerability detection
IaC + container scanning
SOC 2 / ISO / PCI evidence export
Policy-as-code merge gates
Zero source retention option
On-prem / airgapped deploymententerpriseenterprise
False-positive rate< 5%~30%~40%~55%
Median time to first finding< 10 min1 – 2 hrs30 min2 hrs
included partial not available
Comparison based on public product pages · Q1 2026

See your real savings in 15 seconds.

Based on IBM's 2024 Cost of Data Breach Report and anonymized data from our customer base. Adjust the inputs for your org.

Your org
Engineers200
105,000
Repositories80
51,000
Security incidents / year (historical)2
012

Assumes Enterprise plan ($1,500/mo), $95/hr loaded engineer cost, 4hrs/wk/engineer spent on manual security work, 82% breach-avoidance probability per IBM 2024.

Estimated annual value

$8.7M485× ROI

vs. $18,000/yr Guardra Enterprise

Engineer hours reclaimed

6,400 hrs

$608K

Breach cost avoided

2 incidents prevented

$8.0M

Replaced legacy tooling

80 repos covered

$115K

Runs wherever you need it to.

Four deployment models. One platform. Same capabilities across all of them.

Guardra Cloud

SaaS · default

Fully managed, multi-region (US, EU, APAC). Zero infrastructure for you to run. Built on SOC 2 Type II, ISO 27001-certified foundation.

  • 99.99% uptime SLA (Enterprise & Premium)
  • Data residency: US-East, EU-West, AP-South
  • Ephemeral per-tenant enclaves

Customer VPC

Hybrid

Guardra runtime deployed inside your AWS / Azure / GCP VPC. Control-plane in Guardra Cloud, data-plane entirely under your IAM.

  • Source never leaves your cloud
  • Terraform / Helm / ARM deploy
  • Private Link · VPN · Transit Gateway

Self-managed on-prem

Premium

Kubernetes-native single-tenant deployment in your datacenter. Customer-managed encryption keys. Air-gapped installer available.

  • Offline update channel
  • Customer-managed HSM / KMS
  • STIG-hardened reference manifests

Government / FedRAMP

Public sector

FedRAMP Moderate (in process), IL4/IL5 enclave variants, and CJIS-compliant deployments for federal, state, and local government.

  • US citizens-only operations
  • FIPS 140-3 validated crypto
  • GSA / SEWP / CIO-CS available

Simple plans. Outsized protection.

Every plan includes the full Guardra engine — not a stripped-down scanner. Pick your scale. 14-day pilot on every tier.

Basic

For startups putting their first agent into production.

$500/mo

billed monthly · cancel anytime · 14-day pilot

Agents audited
up to 3
Repositories
up to 10
Audits / month
100K
Seats
10
  • Full 5-surface audit (prompts · memory · tools · outputs · code)
  • OWASP LLM Top 10 + OWASP Top 10 Web
  • AI auto-fix PRs (up to 500 / mo)
  • SAST · SCA · secret scanning · IaC
  • Weekly deep audit + every-commit scans
  • Slack / email / webhook alerts
  • Community detector packs (open source)
  • Email support · 48h SLA
Most popular

Enterprise

For scaling orgs with real compliance and agent fleets.

$1,500/mo

billed monthly · cancel anytime · 14-day pilot

Agents audited
up to 25
Repositories
up to 100
Audits / month
2M
Seats
unlimited
  • Everything in Basic +
  • Daily deep audits · unlimited commit scans
  • Unlimited AI auto-fix PRs
  • SOC 2 · ISO 27001 · PCI · HIPAA · EU AI Act evidence
  • Policy-as-code merge gates
  • Custom detectors & allow-lists
  • SSO (Okta / Azure AD) + SCIM
  • Dedicated CSM · 8h SLA
  • 99.99% uptime SLA

Premium

For regulated industries & high-volume agent platforms.

$5,000/mo

billed monthly · cancel anytime · 14-day pilot

Agents audited
unlimited
Repositories
unlimited
Audits / month
unlimited
Seats
unlimited
  • Everything in Enterprise +
  • Private / on-prem / airgap deployment
  • FedRAMP Moderate · IL4 · CJIS environments
  • Customer-managed encryption keys (BYOK/HSM)
  • Bespoke LLM fine-tuning on your corpus
  • Red-team playbooks · quarterly threat modeling
  • 24/7 incident response hotline · 1h SLA
  • Named security engineer + quarterly reviews
  • Custom MSA · DPA · BAA

All plans: unlimited users · zero source retention · 99.99% uptime SLA on Enterprise & Premium · annual contracts get 2 months free

Security people you'd want on your side of the table.

Our team has shipped the tools that defended the banks, clouds, and governments you already trust.

RR

Ramiz Rafiq

Founder & CEO

15 yrs cybersecurity. Led red-team and AppSec programs across financial services and healthcare. Dual CISSP / OSCP.

EM

Dr. Elena Markov

Chief Scientist

Ex-Google Project Zero. PhD in applied cryptography. 60+ published CVEs across browsers, kernels, and cloud runtimes.

JO

Jamal Okafor

VP Engineering

Ex-CrowdStrike principal engineer. Built and scaled detection infrastructure processing 1T events/day.

SK

Sanaya Kapoor

Head of Trust & Compliance

Ex-Big 4 cyber partner. Led SOC 2, ISO 27001, and FedRAMP programs for four hyper-growth SaaS companies.

Advisory board

  • Former CISO · Fortune 50 bank
  • Ex-NSA · Tailored Access Operations
  • Former Director · CISA
  • Former CTO · Top-3 cloud provider

As featured in

TechCrunchForbesWall Street JournalWiredThe InformationDark ReadingSC MediaCSO Online

Guardra is doing for application security what Stripe did for payments — making the hard part invisible.

Forbes

The first scanner we've tested where auto-fix isn't a gimmick. The PRs are production-quality.

Dark Reading

In a category crowded with me-too scanners, Guardra stands out for its breadth and its restraint.

The Information

Learn from the 900+ teams who went first.

Research, playbooks, certifications, and live sessions — produced by practitioners, free forever.

Flagship report

State of Code Security 2026

Our annual benchmark — drawn from 4.2M repos, 900+ customers, and 12.8M secret exposures. The definitive view on where engineering risk is really moving.

We'll email the PDF and add you to the monthly research digest.

Playbook

The CISO's guide to securing AI-generated code

40-page practical framework for governing AI coding assistants. Used by security leaders at 200+ enterprises.

Get the playbook
Certification

Guardra Certified Security Engineer

Free, self-paced. 12 modules covering modern AppSec, SAST/DAST/SCA fundamentals, and remediation strategy.

Start learning
Webinar

Live: SOC 2 in 30 days with a 6-person team

CISO from NorthBank walks through the exact process. Next session: May 8, 2026 · 10am PT.

Reserve a seat

Questions a CISO would actually ask.

Two modes. (1) Inline SDK: wrap your LLM calls — Guardra audits every prompt, tool call, memory write, and output in under 40ms p50. (2) Trace replay: send us OpenTelemetry / LangSmith / LangFuse traces and we replay them through 12k+ detectors plus an LLM-as-judge. Both return OWASP LLM Top 10-mapped findings with production-ready fixes.

OpenAI, Anthropic, Google Gemini, AWS Bedrock, Azure OpenAI, Cohere, Mistral, and any custom provider via our adapter. Native hooks for LangChain, LangGraph, CrewAI, LlamaIndex, Semantic Kernel, Vercel AI SDK, Pydantic AI, and the OpenAI Agents SDK. Model- and framework-agnostic at the protocol layer.

p50 under 40ms, p95 under 120ms for inline audits. You can run Guardra synchronously (blocking) or asynchronously (fire-and-forget with later reconciliation). Fail-open mode keeps your agent running if Guardra is ever degraded — we never want to be the reason your product goes down.

Not unless you choose SaaS. Guardra runs in one of four modes: Guardra Cloud (multi-region, ephemeral enclaves), inside your VPC (data-plane stays in your cloud), on-prem, or airgapped. Source and traces are analyzed in memory and discarded — findings, not raw data, are what persist. Premium supports customer-managed keys (BYOK) and HSM.

They scan code. Guardra audits your agent AND your code, prioritizes by real exploitability, and ships the fix. In head-to-head trials we reduce false positives by 80%+ and cut median remediation time from weeks to under 15 minutes.

Every fix runs through a secondary adversarial-review model, is validated against a regression test we also author, and ships with a confidence score. You can require human approval on any severity, path, or repo via policy-as-code. 91% of our customers' fixes merge without human touch; the 9% that don't are the ones that should get reviewed.

Covered. Guardra scans every document entering your RAG index against our adversarial corpus (2M+ labeled examples). We also analyze retrieval outputs at inference time to detect injected instructions smuggled in via docs, emails, PDFs, or scraped web content.

Yes. 14-day pilot on every plan — full features, no credit card. Most teams find their first critical issue within 10 minutes of installing the SDK. For open-source maintainers: Guardra is free forever.

By audits/month, which covers every prompt, tool call, memory write, output eval, or code scan. Plans include generous monthly allowances (100K / 2M / unlimited). Overages are never billed automatically — you'll get alerts at 50%, 75%, 90% and can set hard caps.

Evidence exported on demand. Guardra maps its own controls and your audit findings into SOC 2 CC / ISO 27001 Annex A / PCI-DSS / HIPAA Security Rule / GDPR / EU AI Act Articles 9–15. Your auditor gets a signed, timestamped package — we've had customers close renewals in 48 hours.

Yes, on Premium. Kubernetes-native single-tenant deployment with offline update channel, customer-managed encryption keys, FIPS 140-3 validated crypto, and STIG-hardened reference manifests. FedRAMP Moderate in process; IL4/IL5 enclaves available for federal.

SOC 2 Type II, ISO 27001 / 27017 / 27018, PCI-DSS L1, HIPAA, GDPR, CSA STAR. Penetration-tested quarterly by external firms. Bug bounty via HackerOne. Full security reports and SBOM available at guardra.ai/trust.

Ready to see every gap in your codebase? Start in 60 seconds.

Your first deep audit is free. No card required. Connect a repo and Guardra will show you exactly where you're exposed — and fix it.

Start free audit Book a 15-min demo

SOC 2 · ISO 27001 · Zero data retention