Have something to say?

Tell us how we could make the product more useful to you.

In Progress

IntelliJ IDEA Plugin V2 (Cybe Agent & In-IDE Autofix)

Introduce CybeDefend IntelliJ IDEA Plugin V2, delivering a fully redesigned developer experience and bringing remediation workflows directly into JetBrains IDEs. This new version integrates Cybe Agent to help developers remediate vulnerabilities faster using Cybe Autofix and DeepFix, while enabling seamless collaboration through direct vulnerability metadata management inside the IDE. Key capabilities Cybe Agent Integration - Add native Cybe Agent support inside IntelliJ IDEA to orchestrate remediation actions directly from the IDE environment, enabling secure and contextual vulnerability fixing workflows. Cybe Autofix in IDE - Enable one-click remediation of detected code vulnerabilities without leaving IntelliJ IDEA, allowing developers to apply secure fixes directly within their coding workflow. DeepFix for SCA in IDE - Allow developers to remediate Software Composition Analysis (SCA) vulnerabilities directly from IntelliJ IDEA, including dependency upgrade recommendations and automated fixes. Complete UX/UI Redesign - Deliver a fully redesigned plugin interface aligned with JetBrains UX guidelines, improving navigation, vulnerability visualization, and daily usability. Vulnerability Status Management - Update vulnerability lifecycle status directly from the plugin (e.g., open, in progress, resolved) to maintain synchronization with the CybeDefend platform. Priority Management in IDE - Edit vulnerability priority directly inside IntelliJ IDEA to align remediation effort with real risk exposure and development planning. Inline Collaboration Comments - Add and update vulnerability comments directly from the IDE to improve traceability, developer collaboration, and security review workflows.

Florentin Ledy 3 days ago

Completed

VS Code Extension V2 (Cybe Agent & In-IDE Autofix)

Introduce CybeDefend VS Code Extension V2, delivering a fully redesigned developer experience and bringing remediation workflows directly into the IDE. This new version adds Cybe Agent support to help developers fix vulnerabilities faster with Cybe Autofix and DeepFix, while improving collaboration through direct vulnerability metadata updates. Key capabilities: Cybe Agent Integration – Add native support for Cybe Agent inside VS Code to orchestrate remediation actions directly from the IDE. Cybe Autofix in IDE – Enable one-click remediation of code vulnerabilities without leaving the development workflow. DeepFix for SCA in IDE – Allow developers to fix Software Composition Analysis (SCA) vulnerabilities directly in VS Code. Complete UX/UI Redesign – Deliver a fully revamped extension design for better clarity, navigation, and day-to-day usability. Vulnerability Status Management – Update vulnerability status directly from the extension (e.g., open, in progress, resolved). Priority Management in IDE – Edit vulnerability priority from VS Code to align remediation effort with risk. Inline Collaboration Comments – Add and update vulnerability comments from the extension to improve traceability and team coordination.

Florentin Ledy 16 days ago

1

Completed

Personal Access Tokens (PAT)

Introduce Personal Access Tokens (PAT) in CybeDefend and remove legacy API keys to improve credential security and access governance. This feature will enforce least-privilege access, stronger lifecycle management, and full audit visibility. Key capabilities: PAT-based Authentication – Replace static API keys with user-bound personal access tokens. Immediate API Key Deprecation – Remove API key support when PAT is released, with no backward compatibility. Token Expiration & Rotation – Enforce expiration policies and support secure token rotation. Usage Tracking & Audit Logs – Record token creation, usage, and revocation events for monitoring and compliance.

Florentin Ledy 17 days ago

Completed

Enterprise Authentication (SSO)

Introduce Enterprise SSO in CybeDefend, enabling organizations to authenticate users through their corporate identity providers. This feature will improve security, simplify onboarding, and enforce centralized access governance across teams. Key capabilities: SAML & OIDC Support – Enable secure single sign-on using enterprise-standard protocols. Google Workspace, Microsoft Entra ID, and Okta Integrations – Provide ready-to-use connectors for fast setup. Domain-based Access Control – Restrict authentication to approved corporate domains. SSO Audit Logs – Track login events, failures, and identity-provider activity for compliance and incident response.

Florentin Ledy 17 days ago

Planned

Integrated IaC and Runtime Security Correlation

Introduce the ability to correlate runtime security findings with Infrastructure-as-Code (IaC) templates, creating a unified view across development and production environments. This feature allows CybeDefend to continuously scan deployed infrastructures, detect runtime misconfigurations, and map them back to their originating IaC definitions to ensure full traceability and contextual remediation. By identifying drifts between IaC templates and the actual runtime state, the platform helps prevent configuration drift, shadow resources, and untracked security risks. Detected issues can be remediated directly in code or through AI-powered autofixes, ensuring that security improvements are automatically propagated across environments.

Florentin Ledy 4 months ago

Planned

AI Agent Security Platform to orchestrate, monitor, and secure autonomous AI agents

This feature establishes a centralized control plane for supervising all AI-driven operations, ensuring that every action performed by agents (e.g., call_tool, run_command, api_request, file_write) is intercepted, analyzed, and governed according to strict security policies. The platform integrates real-time risk evaluation mechanisms capable of detecting threats such as prompt injection, data exfiltration attempts, and unauthorized access. It enforces Policy-as-Code authorization logic, allowing organizations to define granular control rules for AI actions and data access boundaries. Comprehensive security observability is ensured through detailed logging, alerting, and full audit trails, enabling forensic analysis, incident response, and compliance verification. Users will be able to: Intercept and control all AI agent operations through a secure orchestration layer. Evaluate the security risk of each agent action with context-aware detection for prompt manipulation and data misuse. Define and enforce authorization policies dynamically using a Policy-as-Code model. Access centralized dashboards with real-time alerts, risk scores, and complete historical audit logs for accountability and compliance.

Florentin Ledy 4 months ago

Planned

NIS2 Security Report Generation per Project

ntroduce the ability to generate NIS2 compliance and security posture reports for individual projects. This feature ensures alignment with the EU NIS2 Directive by evaluating the organization’s adherence to essential cybersecurity measures such as risk management, incident handling, supply chain security, and vulnerability management. The system will automatically correlate detected vulnerabilities, control gaps, and remediation activities with the relevant NIS2 Articles and Annex II security requirements, enabling continuous compliance monitoring. Users will be able to: Generate project-level or organization-wide NIS2 compliance reports to assess conformity with regulatory obligations. Identify missing technical and organizational measures required by NIS2, with prioritized recommendations for remediation. Export reports in various formats (PDF, JSON, HTML) for auditors, compliance officers, or regulatory submissions.

Florentin Ledy 4 months ago

Completed

MITRE CWE Top 25 Security Report Generation per Project

Introduce the ability to generate CWE Top 25 security reports for individual projects. This feature will analyze detected vulnerabilities and map them to the latest MITRE CWE Top 25 Most Dangerous Software Weaknesses, providing detailed insights into the most critical weakness types affecting the codebase. Each report will include a breakdown of occurrences per CWE category, risk prioritization, and recommended remediation strategies aligned with secure coding best practices. Users will be able to: Generate project-level or organization-wide CWE Top 25 reports to evaluate exposure to the most critical software weaknesses. Track weakness trends over time to measure improvements in code quality and security posture. Export reports in multiple formats (PDF, JSON, HTML) for compliance documentation, management reporting, or integration into external systems.

Florentin Ledy 4 months ago

Completed

Support for French Language in the User Interface

CybeDefend will soon offer a French-language user interface, in addition to the existing English version. Users will be able to select their preferred language directly from their account settings. All key UI elements (menus, buttons, dashboards, error messages, reports, etc.) will be translated to provide a smoother and more accessible experience for French-speaking teams. Note: vulnerability descriptions (SCA, SAST, etc.) will initially remain in English to ensure accuracy. French translations of these technical contents are planned for a future release. This enhancement is part of our commitment to improving adoption in francophone and multilingual environments.

Florentin Ledy 8 months ago

Planned

ALPHA - Business Logic Security Analysis (BLSA)

CybeDefend introduces Business Logic Security Analysis (BLSA), an advanced AI-powered security technology designed to detect flaws related to your application's business logic. Unlike traditional tools (SAST, IaC, SCA), BLSA understands the functional context of your software architecture and identifies vulnerabilities that rule-based approaches cannot detect — such as payment bypasses, privilege escalation, or exploitable workflow transitions. The system is based on: Specialized AI agents, each analyzing different parts of the code in parallel to build a coherent mental model. Split prompting, which intelligently segments large monorepos or microservices for exhaustive analysis. Smart correlation of findings to produce a unified, contextualized, and actionable report. BLSA helps to: Reduce the need for costly manual audits. Enhance DevSecOps pipelines by combining technical and business logic analysis. Achieve deeper security coverage early in the development lifecycle. This feature will be initially available through an early access program for selected users.

Florentin Ledy 8 months ago