Skip to main content

Analyzers

Analyzers are modular engines that mine correlated data from Context Graph to surface domain-specific insights. Each analyzer provides no-code visualizations through Sightlines, stat cards, and widgets.

Blueprints

  • AWS
  • Azure
  • GCP
  • GitHub
  • 20+ more

Context Graph

  • Context Graph
  • Enrichment Pipeline
  • Correlation Engine

Analyzers

  • Sightlines
  • Widgets & Stat Cards
  • Insight Feed Alerts

Each analyzer requires one or more Blueprints to be connected. The Blueprint ingests data into the Context Graph, where the analyzer's correlation engine detects misconfigurations, vulnerabilities, and risks — then surfaces them as prioritized Insight Feed alerts and visual Sightlines.


AWS

NameWhat it analyzes
AWS ComputeEC2 instances, ECS clusters, workloads, and spot instances
AWS NetworkVPCs, Route 53, VPNs, subnets, and security groups
AWS StorageS3 buckets, EBS volumes, and storage configurations
AWS StreamingKinesis streams and streaming infrastructure
AWS RDSRDS cluster security, compliance, and operational health
AWS IAMIAM users, roles, policies, and access patterns

Azure

NameWhat it analyzes
Azure IAMIAM roles and access management
Azure NetworkVNets, DNS configurations, and VPN setups
Azure StorageStorage accounts, containers, and blobs
Azure DatabaseSQL Database, Redis Cache, Cosmos DB, Synapse Analytics, and Data Factory
Azure AIAzure OpenAI accounts, network access, and deployment configuration
Azure StreamingEvent Grid topics, network access, and security posture

GCP

NameWhat it analyzes
GCP IAMIAM roles and access management
GCP ComputeCompute Engine instances and workloads
GCP NetworkVPCs, firewall rules, and networking infrastructure
GCP StorageCloud Storage buckets and configurations
GCP DatabaseCloud SQL, Spanner, and database services
GCP DevOpsCloud Build triggers and CI/CD infrastructure
GCP AI & OrchestrationVertex AI endpoints and Cloud Composer environments

Security & Compliance

NameWhat it analyzes
Secrets and PIIExposed API keys, passwords, and personally identifiable information
CodeCodebase vulnerabilities, security risks, and compliance issues
Software Composition AnalysisSBOM evaluation for vulnerabilities, license issues, and dependency risks
IaCInfrastructure-as-code misconfigurations (Terraform, CloudFormation, K8s manifests)

AI Security

NameWhat it analyzes
AI DASTDynamic security testing for AI models and agents -- prompt injection, data leakage, model manipulation
AI IAMIdentity and access visibility for AI models and agents
AI SASTStatic analysis of AI/ML code, prompts, agents, and IaC configurations

Infrastructure

NameWhat it analyzes
KubernetesCluster state, nodes, pods, containers, storage, and events
DatabaseDatabase environments including tables, schemas, users, and access

Engineering & DevOps

NameWhat it analyzes
Engineering OperationsPull requests, commits, repository activity, and net changes
RepositoryRepository configurations, permissions, and security posture

Application

NameWhat it analyzes
ApplicationApplication-level security posture and risk scoring
ArtifactBuild artifacts and package security