About
Codacy is a comprehensive platform for code quality and security that helps development teams build secure, maintainable, and compliant software. It integrates across the entire development lifecycle, from IDE to production, providing real-time feedback and automated checks. Codacy analyzes code repositories, enforces quality standards, and detects vulnerabilities before deployment. With AI Guardrails, it also protects against risks introduced by AI-generated code. The platform centralizes rules and policies, ensuring consistency across teams and projects. Developers benefit from automated pull request checks, test coverage tracking, and actionable insights. Overall, Codacy enables faster development without compromising security or code quality.
|
About
ZeroPath (YC S24) is an AI-native application security platform that delivers comprehensive code protection beyond traditional SAST. Founded by security engineers from Tesla and Google, ZeroPath combines large language models with advanced program analysis to find and automatically fix vulnerabilities.
ZeroPath provides complete security coverage:
1. AI-powered SAST for business logic flaws & broken authentication
2. SCA with reachability analysis
3. Secrets detection and validation
4. Infrastructure as Code
5. Automated patch generation.
any more...
ZeroPath delivers 2x more real vulnerabilities with 75% fewer false positives.
Our research team has been successful in finding vulns like critical account takeover in better-auth (CVE-2025-61928, 300k+ weekly downloads), identifying 170+ verified bugs in curl, and discovering 0-days in production systems at Netflix, Hulu, and Salesforce.
Trusted by 750+ companies and performing 200k+ code scans monthly.
|
|||||
Platforms Supported
Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook
|
Platforms Supported
Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook
|
|||||
Audience
Developers, DevOps teams, and engineering organizations that need automated code quality, security, and compliance tools for modern software development
|
Audience
Teams seeking a solution to enhance their application security processes without compromising development speed
|
|||||
Support
Phone Support
24/7 Live Support
Online
|
Support
Phone Support
24/7 Live Support
Online
|
|||||
API
Offers API
|
API
Offers API
|
|||||
Screenshots and Videos |
Screenshots and Videos |
|||||
Pricing
$21/user/month
Free Version
Free Trial
|
Pricing
Free
Free Version
Free Trial
|
|||||
Reviews/
|
Reviews/
|
|||||
Training
Documentation
Webinars
Live Online
In Person
|
Training
Documentation
Webinars
Live Online
In Person
|
|||||
Company InformationCodacy
Founded: 2012
Portugal
www.codacy.com
|
Company InformationZeroPath
Founded: 2024
United States
zeropath.com
|
|||||
Alternatives |
Alternatives |
|||||
|
|
|
|||||
|
|
||||||
Categories |
Categories |
|||||
Static Code Analysis Features
Analytics / Reporting
Code Standardization / Validation
Multiple Programming Language Support
Provides Recommendations
Standard Security/Industry Libraries
Vulnerability Management
Automated Testing Features
Hierarchical View
Move & Copy
Parameterized Testing
Requirements-Based Testing
Security Testing
Supports Parallel Execution
Test Script Reviews
Unicode Compliance
|
Static Code Analysis Features
Analytics / Reporting
Code Standardization / Validation
Multiple Programming Language Support
Provides Recommendations
Standard Security/Industry Libraries
Vulnerability Management
Application Security Features
Analytics / Reporting
Open Source Component Monitoring
Source Code Analysis
Third-Party Tools Integration
Training Resources
Vulnerability Detection
Vulnerability Remediation
Cybersecurity Features
AI / Machine Learning
Behavioral Analytics
Endpoint Management
Incident Management
IOC Verification
Tokenization
Vulnerability Scanning
Whitelisting / Blacklisting
Static Application Security Testing (SAST) Features
Application Security
Dashboard
Debugging
Deployment Management
IDE
Multi-Language Scanning
Real-Time Analytics
Source Code Scanning
Vulnerability Scanning
Vulnerability Scanners Features
Asset Discovery
Black Box Scanning
Compliance Monitoring
Continuous Monitoring
Defect Tracking
Interactive Scanning
Logging and Reporting
Network Mapping
Perimeter Scanning
Risk Analysis
Threat Intelligence
Web Inspection
|
|||||
Integrations
Bitbucket
C
C++
Dart
Docker
Elixir
GitHub
GitLab
Go
Java
|
Integrations
Bitbucket
C
C++
Dart
Docker
Elixir
GitHub
GitLab
Go
Java
|
|||||
|
|