Product
Everything you need to secure code, cloud, and runtime– in one central system
Dependencies
Prevent open-source risks (SCA)
Secrets
Get flagged for exposed secrets
SAST
Secure code as its written
Container Images
Keep base images secure
Malware
Prevent supply chain attacks
IaC
Scan IaC for misconfigurations
License Risk
Avoid risk, be compliant
Outdated Software
Know your EOL runtimes
Custom
Bring your own scanner
CSPM
Cloud misconfigurations
DAST
Black-box security testing
API Scanning
Test your API’s for vuln
Runtime Protection
In-app Firewall / WAF
Features
AI Autofix
1-click fixes with Aikido AI
CI/CD Security
Scan before merge and deployment
IDE Integrations
Get instant feedback while coding
Solutions
Use Cases
Compliance
Automate SOC 2, ISO & more
Vulnerability Management
All-in-1 vuln management
Secure Your Code
Advanced code security
Generate SBOMs
1 click SCA reports
ASPM
End-to-end AppSec
AI at Aikido
Let Aikido AI do the work
Block 0-Days
Block threats before impact
Industries
FinTech
HealthTech
HRTech
Legal Tech
Group Companies
Agencies
Startups
Enterprise
Mobile apps
Manufacturing
Pricing
Resources
Developer
Docs
How to use Aikido
Public API docs
Aikido developer hub
Changelog
See what shipped
Security
In-house research
Malware & CVE intelligence
Glossary
Security jargon guide
Trust Center
Safe, private, compliant
Open Source
Aikido Intel
Malware & OSS threat feed
Zen
In-app firewall protection
OpenGrep
Code analysis engine
Integrations
IDEs
CI/CD Systems
Clouds
Git Systems
Compliance
Messengers
Task Managers
More integrations
About
About
About
Meet the team
Careers
We’re hiring
Press Kit
Download brand assets
Calendar
See you around?
Open Source
Our OSS projects
Blog
The latest posts
Customer Stories
Trusted by the best teams
Contact
Login
Start for Free
No CC required
Menu
Login
Start Free
Glossary
Get to know the language of the (web) application security world.
Table of Contents
AICPA SOC 2
CI/CD Pipeline Security
Cloud misconfiguration
Cloud posture management
Common Vulnerabilities and Exposures (CVE)
Container Scanning
Dynamic Application Security Testing (DAST)
False positives
ISO 27001:2022
Infrastructure as code (IaC) scanning
OWASP Top 10
Open Source Audits
Open Source Dependencies
Open Source License Management
Open Source License Scanning
Open Source Vulnerability Scanning
Pentesting & PtaaS
SAST & DAST
SQL Injection
Secrets detection
Software Bill Of Materials (SBOM)
Software Composition Analysis (SCA)
Software Supply Chain Security
Source Code Secrets Detection
Static Application Security Testing (SAST)
Static Code Analysis
Technical Vulnerability Management
XSS Vulnerabilities