Analyzers are modular engines that mine correlated data from Context Graph to surface domain-specific insights. Each analyzer provides no-code visualizations through Sightlines, stat cards, and widgets.
Blueprints
- AWS
- Azure
- GCP
- GitHub
- 20+ more
→Context Graph
- Context Graph
- Enrichment Pipeline
- Correlation Engine
→Analyzers
- Sightlines
- Widgets & Stat Cards
- Insight Feed Alerts
Each analyzer requires one or more Blueprints to be connected. The Blueprint ingests data into the Context Graph, where the analyzer's correlation engine detects misconfigurations, vulnerabilities, and risks — then surfaces them as prioritized Insight Feed alerts and visual Sightlines.
AWS
| Name | What it analyzes |
|---|
| AWS Compute | EC2 instances, ECS clusters, workloads, and spot instances |
| AWS Network | VPCs, Route 53, VPNs, subnets, and security groups |
| AWS Storage | S3 buckets, EBS volumes, and storage configurations |
| AWS Streaming | Kinesis streams and streaming infrastructure |
| AWS RDS | RDS cluster security, compliance, and operational health |
| AWS IAM | IAM users, roles, policies, and access patterns |
Azure
| Name | What it analyzes |
|---|
| Azure IAM | IAM roles and access management |
| Azure Network | VNets, DNS configurations, and VPN setups |
| Azure Storage | Storage accounts, containers, and blobs |
| Azure Database | SQL Database, Redis Cache, Cosmos DB, Synapse Analytics, and Data Factory |
| Azure AI | Azure OpenAI accounts, network access, and deployment configuration |
| Azure Streaming | Event Grid topics, network access, and security posture |
GCP
Security & Compliance
| Name | What it analyzes |
|---|
| Secrets and PII | Exposed API keys, passwords, and personally identifiable information |
| Code | Codebase vulnerabilities, security risks, and compliance issues |
| Software Composition Analysis | SBOM evaluation for vulnerabilities, license issues, and dependency risks |
| IaC | Infrastructure-as-code misconfigurations (Terraform, CloudFormation, K8s manifests) |
AI Security
| Name | What it analyzes |
|---|
| AI DAST | Dynamic security testing for AI models and agents -- prompt injection, data leakage, model manipulation |
| AI IAM | Identity and access visibility for AI models and agents |
| AI SAST | Static analysis of AI/ML code, prompts, agents, and IaC configurations |
Infrastructure
| Name | What it analyzes |
|---|
| Kubernetes | Cluster state, nodes, pods, containers, storage, and events |
| Database | Database environments including tables, schemas, users, and access |
Engineering & DevOps
| Name | What it analyzes |
|---|
| Engineering Operations | Pull requests, commits, repository activity, and net changes |
| Repository | Repository configurations, permissions, and security posture |
Application
| Name | What it analyzes |
|---|
| Application | Application-level security posture and risk scoring |
| Artifact | Build artifacts and package security |