Menu
Close
Products
Your central platform, full coverage from code-to-cloud.
Cloud
Dependencies
Secrets
SAST
Container Images
DAST
Malware
Custom
IaC
License Risk
Outdated Software
Your in-app firewall for peace of mind
By Aikido
Get Zen
Solutions
Industries
FinTech
HealthTech
HRTech
Legal Tech
Group Companies
Agencies
Startups
Enterprise
Use Cases
Compliance
Vulnerability Management
Secure Your Code
Generate SBOMs
ASPM
Pricing
Resources
Developer
Docs
Public API docs
Changelog
Integrations
Security
Intel
Glossary
Trust Center
OS threat feed & CVE intelligence powered by in-house research.
Aikido Intel
About
About Us
About
Careers
We're hiring!
Press Kit
Calendar
Blog
LinkedIn
Twitter
Contact
Login
Start Free
Login
Start Free
Glossary
Get to know the language of the (web) application security world.
Table of Contents
AICPA SOC 2
CI/CD Pipeline Security
Cloud misconfiguration
Cloud posture management
Common Vulnerabilities and Exposures (CVE)
Container Scanning
Dynamic Application Security Testing (DAST)
False positives
ISO 27001:2022
Infrastructure as code (IaC) scanning
OWASP Top 10
Open Source Audits
Open Source Dependencies
Open Source License Management
Open Source License Scanning
Open Source Vulnerability Scanning
Pentesting & PtaaS
SAST & DAST
SQL Injection
Secrets detection
Software Bill Of Materials (SBOM)
Software Composition Analysis (SCA)
Software Supply Chain Security
Source Code Secrets Detection
Static Application Security Testing (SAST)
Static Code Analysis
Technical Vulnerability Management
XSS Vulnerabilities