In Progress
IntelliJ IDEA Plugin V2 (Cybe Agent & In-IDE Autofix)
Introduce CybeDefend IntelliJ IDEA Plugin V2, delivering a fully redesigned developer experience and bringing remediation workflows directly into JetBrains IDEs. This new version integrates Cybe Agent to help developers remediate vulnerabilities faster using Cybe Autofix and DeepFix, while enabling seamless collaboration through direct vulnerability metadata management inside the IDE. Key capabilities Cybe Agent Integration - Add native Cybe Agent support inside IntelliJ IDEA to orchestrate remediation actions directly from the IDE environment, enabling secure and contextual vulnerability fixing workflows. Cybe Autofix in IDE - Enable one-click remediation of detected code vulnerabilities without leaving IntelliJ IDEA, allowing developers to apply secure fixes directly within their coding workflow. DeepFix for SCA in IDE - Allow developers to remediate Software Composition Analysis (SCA) vulnerabilities directly from IntelliJ IDEA, including dependency upgrade recommendations and automated fixes. Complete UX/UI Redesign - Deliver a fully redesigned plugin interface aligned with JetBrains UX guidelines, improving navigation, vulnerability visualization, and daily usability. Vulnerability Status Management - Update vulnerability lifecycle status directly from the plugin (e.g., open, in progress, resolved) to maintain synchronization with the CybeDefend platform. Priority Management in IDE - Edit vulnerability priority directly inside IntelliJ IDEA to align remediation effort with real risk exposure and development planning. Inline Collaboration Comments - Add and update vulnerability comments directly from the IDE to improve traceability, developer collaboration, and security review workflows.

Florentin Ledy 3 days ago
In Progress
IntelliJ IDEA Plugin V2 (Cybe Agent & In-IDE Autofix)
Introduce CybeDefend IntelliJ IDEA Plugin V2, delivering a fully redesigned developer experience and bringing remediation workflows directly into JetBrains IDEs. This new version integrates Cybe Agent to help developers remediate vulnerabilities faster using Cybe Autofix and DeepFix, while enabling seamless collaboration through direct vulnerability metadata management inside the IDE. Key capabilities Cybe Agent Integration - Add native Cybe Agent support inside IntelliJ IDEA to orchestrate remediation actions directly from the IDE environment, enabling secure and contextual vulnerability fixing workflows. Cybe Autofix in IDE - Enable one-click remediation of detected code vulnerabilities without leaving IntelliJ IDEA, allowing developers to apply secure fixes directly within their coding workflow. DeepFix for SCA in IDE - Allow developers to remediate Software Composition Analysis (SCA) vulnerabilities directly from IntelliJ IDEA, including dependency upgrade recommendations and automated fixes. Complete UX/UI Redesign - Deliver a fully redesigned plugin interface aligned with JetBrains UX guidelines, improving navigation, vulnerability visualization, and daily usability. Vulnerability Status Management - Update vulnerability lifecycle status directly from the plugin (e.g., open, in progress, resolved) to maintain synchronization with the CybeDefend platform. Priority Management in IDE - Edit vulnerability priority directly inside IntelliJ IDEA to align remediation effort with real risk exposure and development planning. Inline Collaboration Comments - Add and update vulnerability comments directly from the IDE to improve traceability, developer collaboration, and security review workflows.

Florentin Ledy 3 days ago
Completed
VS Code Extension V2 (Cybe Agent & In-IDE Autofix)
Introduce CybeDefend VS Code Extension V2, delivering a fully redesigned developer experience and bringing remediation workflows directly into the IDE. This new version adds Cybe Agent support to help developers fix vulnerabilities faster with Cybe Autofix and DeepFix, while improving collaboration through direct vulnerability metadata updates. Key capabilities: Cybe Agent Integration – Add native support for Cybe Agent inside VS Code to orchestrate remediation actions directly from the IDE. Cybe Autofix in IDE – Enable one-click remediation of code vulnerabilities without leaving the development workflow. DeepFix for SCA in IDE – Allow developers to fix Software Composition Analysis (SCA) vulnerabilities directly in VS Code. Complete UX/UI Redesign – Deliver a fully revamped extension design for better clarity, navigation, and day-to-day usability. Vulnerability Status Management – Update vulnerability status directly from the extension (e.g., open, in progress, resolved). Priority Management in IDE – Edit vulnerability priority from VS Code to align remediation effort with risk. Inline Collaboration Comments – Add and update vulnerability comments from the extension to improve traceability and team coordination.

Florentin Ledy 16 days ago
Completed
VS Code Extension V2 (Cybe Agent & In-IDE Autofix)
Introduce CybeDefend VS Code Extension V2, delivering a fully redesigned developer experience and bringing remediation workflows directly into the IDE. This new version adds Cybe Agent support to help developers fix vulnerabilities faster with Cybe Autofix and DeepFix, while improving collaboration through direct vulnerability metadata updates. Key capabilities: Cybe Agent Integration – Add native support for Cybe Agent inside VS Code to orchestrate remediation actions directly from the IDE. Cybe Autofix in IDE – Enable one-click remediation of code vulnerabilities without leaving the development workflow. DeepFix for SCA in IDE – Allow developers to fix Software Composition Analysis (SCA) vulnerabilities directly in VS Code. Complete UX/UI Redesign – Deliver a fully revamped extension design for better clarity, navigation, and day-to-day usability. Vulnerability Status Management – Update vulnerability status directly from the extension (e.g., open, in progress, resolved). Priority Management in IDE – Edit vulnerability priority from VS Code to align remediation effort with risk. Inline Collaboration Comments – Add and update vulnerability comments from the extension to improve traceability and team coordination.

Florentin Ledy 16 days ago
Completed
Personal Access Tokens (PAT)
Introduce Personal Access Tokens (PAT) in CybeDefend and remove legacy API keys to improve credential security and access governance. This feature will enforce least-privilege access, stronger lifecycle management, and full audit visibility. Key capabilities: PAT-based Authentication – Replace static API keys with user-bound personal access tokens. Immediate API Key Deprecation – Remove API key support when PAT is released, with no backward compatibility. Token Expiration & Rotation – Enforce expiration policies and support secure token rotation. Usage Tracking & Audit Logs – Record token creation, usage, and revocation events for monitoring and compliance.

Florentin Ledy 17 days ago
High Priority
Completed
Personal Access Tokens (PAT)
Introduce Personal Access Tokens (PAT) in CybeDefend and remove legacy API keys to improve credential security and access governance. This feature will enforce least-privilege access, stronger lifecycle management, and full audit visibility. Key capabilities: PAT-based Authentication – Replace static API keys with user-bound personal access tokens. Immediate API Key Deprecation – Remove API key support when PAT is released, with no backward compatibility. Token Expiration & Rotation – Enforce expiration policies and support secure token rotation. Usage Tracking & Audit Logs – Record token creation, usage, and revocation events for monitoring and compliance.

Florentin Ledy 17 days ago
High Priority
Completed
Enterprise Authentication (SSO)
Introduce Enterprise SSO in CybeDefend, enabling organizations to authenticate users through their corporate identity providers. This feature will improve security, simplify onboarding, and enforce centralized access governance across teams. Key capabilities: SAML & OIDC Support – Enable secure single sign-on using enterprise-standard protocols. Google Workspace, Microsoft Entra ID, and Okta Integrations – Provide ready-to-use connectors for fast setup. Domain-based Access Control – Restrict authentication to approved corporate domains. SSO Audit Logs – Track login events, failures, and identity-provider activity for compliance and incident response.

Florentin Ledy 17 days ago
High Priority
Completed
Enterprise Authentication (SSO)
Introduce Enterprise SSO in CybeDefend, enabling organizations to authenticate users through their corporate identity providers. This feature will improve security, simplify onboarding, and enforce centralized access governance across teams. Key capabilities: SAML & OIDC Support – Enable secure single sign-on using enterprise-standard protocols. Google Workspace, Microsoft Entra ID, and Okta Integrations – Provide ready-to-use connectors for fast setup. Domain-based Access Control – Restrict authentication to approved corporate domains. SSO Audit Logs – Track login events, failures, and identity-provider activity for compliance and incident response.

Florentin Ledy 17 days ago
High Priority
Planned
Outdated and End-of-Life Software Detection
Add a scanner that identifies outdated or end-of-life software components in the codebase and dependencies. It tracks version history, security advisories, and lifecycle data to alert teams about components that require updates or replacement to reduce security and maintenance risks.

Florentin Ledy 3 months ago
High Priority
Planned
Outdated and End-of-Life Software Detection
Add a scanner that identifies outdated or end-of-life software components in the codebase and dependencies. It tracks version history, security advisories, and lifecycle data to alert teams about components that require updates or replacement to reduce security and maintenance risks.

Florentin Ledy 3 months ago
High Priority
Planned
Open Source License Risk and SBOM Management
Add a component that generates and analyzes SBOMs while identifying license types and associated legal or operational risks. It helps ensure compliance by detecting incompatible licenses, tracking transitive dependencies, and providing clear insights into open source obligations across the entire software stack.

Florentin Ledy 3 months ago
High Priority
Planned
Open Source License Risk and SBOM Management
Add a component that generates and analyzes SBOMs while identifying license types and associated legal or operational risks. It helps ensure compliance by detecting incompatible licenses, tracking transitive dependencies, and providing clear insights into open source obligations across the entire software stack.

Florentin Ledy 3 months ago
High Priority
Planned
Malware Detection for Open Source Packages
Add a scanner that analyzes open source dependencies to detect malicious or compromised packages. It performs static and behavioral checks on package contents, metadata, and embedded scripts to identify suspicious patterns, supply chain attacks, and tampered releases before they enter the application.

Florentin Ledy 3 months ago
Planned
Malware Detection for Open Source Packages
Add a scanner that analyzes open source dependencies to detect malicious or compromised packages. It performs static and behavioral checks on package contents, metadata, and embedded scripts to identify suspicious patterns, supply chain attacks, and tampered releases before they enter the application.

Florentin Ledy 3 months ago
Planned
Secret Detection Scanner
Add a scanner capable of detecting hardcoded secrets not only in the current codebase but also across the full commit history. It identifies API keys, tokens, and credentials through entropy analysis and signature patterns to prevent accidental exposure and improve overall security hygiene.

Florentin Ledy 3 months ago
High Priority
Planned
Secret Detection Scanner
Add a scanner capable of detecting hardcoded secrets not only in the current codebase but also across the full commit history. It identifies API keys, tokens, and credentials through entropy analysis and signature patterns to prevent accidental exposure and improve overall security hygiene.

Florentin Ledy 3 months ago
High Priority
Completed
GitHub Issues Integration for CybeDefend
Introduce a secure, bi-directional integration between CybeDefend and GitHub Issues to operationalize remediation, streamline triage, and ensure end-to-end auditability across repositories.

Florentin Ledy 4 months ago
Medium Priority
Completed
GitHub Issues Integration for CybeDefend
Introduce a secure, bi-directional integration between CybeDefend and GitHub Issues to operationalize remediation, streamline triage, and ensure end-to-end auditability across repositories.

Florentin Ledy 4 months ago
Medium Priority
Completed
GitLab Issues Integration for CybeDefend
Introduce a robust, bi-directional integration between CybeDefend and GitLab Issues to operationalize remediation, streamline triage, and maintain end-to-end auditability across projects.

Florentin Ledy 4 months ago
Medium Priority
Completed
GitLab Issues Integration for CybeDefend
Introduce a robust, bi-directional integration between CybeDefend and GitLab Issues to operationalize remediation, streamline triage, and maintain end-to-end auditability across projects.

Florentin Ledy 4 months ago
Medium Priority
Planned
Slack Integration for CybeDefend
Introduce a secure, bi-directional integration between CybeDefend and Slack to streamline AppSec workflows, incident response, and developer remediation directly within collaboration channels. The integration delivers real-time alerts and interactive triage.

Florentin Ledy 4 months ago
Planned
Slack Integration for CybeDefend
Introduce a secure, bi-directional integration between CybeDefend and Slack to streamline AppSec workflows, incident response, and developer remediation directly within collaboration channels. The integration delivers real-time alerts and interactive triage.

Florentin Ledy 4 months ago
Planned
Integrated IaC and Runtime Security Correlation
Introduce the ability to correlate runtime security findings with Infrastructure-as-Code (IaC) templates, creating a unified view across development and production environments. This feature allows CybeDefend to continuously scan deployed infrastructures, detect runtime misconfigurations, and map them back to their originating IaC definitions to ensure full traceability and contextual remediation. By identifying drifts between IaC templates and the actual runtime state, the platform helps prevent configuration drift, shadow resources, and untracked security risks. Detected issues can be remediated directly in code or through AI-powered autofixes, ensuring that security improvements are automatically propagated across environments.

Florentin Ledy 4 months ago
Planned
Integrated IaC and Runtime Security Correlation
Introduce the ability to correlate runtime security findings with Infrastructure-as-Code (IaC) templates, creating a unified view across development and production environments. This feature allows CybeDefend to continuously scan deployed infrastructures, detect runtime misconfigurations, and map them back to their originating IaC definitions to ensure full traceability and contextual remediation. By identifying drifts between IaC templates and the actual runtime state, the platform helps prevent configuration drift, shadow resources, and untracked security risks. Detected issues can be remediated directly in code or through AI-powered autofixes, ensuring that security improvements are automatically propagated across environments.

Florentin Ledy 4 months ago
Planned
AI Agent Security Platform to orchestrate, monitor, and secure autonomous AI agents
This feature establishes a centralized control plane for supervising all AI-driven operations, ensuring that every action performed by agents (e.g., call_tool, run_command, api_request, file_write) is intercepted, analyzed, and governed according to strict security policies. The platform integrates real-time risk evaluation mechanisms capable of detecting threats such as prompt injection, data exfiltration attempts, and unauthorized access. It enforces Policy-as-Code authorization logic, allowing organizations to define granular control rules for AI actions and data access boundaries. Comprehensive security observability is ensured through detailed logging, alerting, and full audit trails, enabling forensic analysis, incident response, and compliance verification. Users will be able to: Intercept and control all AI agent operations through a secure orchestration layer. Evaluate the security risk of each agent action with context-aware detection for prompt manipulation and data misuse. Define and enforce authorization policies dynamically using a Policy-as-Code model. Access centralized dashboards with real-time alerts, risk scores, and complete historical audit logs for accountability and compliance.

Florentin Ledy 4 months ago
Low Priority
Planned
AI Agent Security Platform to orchestrate, monitor, and secure autonomous AI agents
This feature establishes a centralized control plane for supervising all AI-driven operations, ensuring that every action performed by agents (e.g., call_tool, run_command, api_request, file_write) is intercepted, analyzed, and governed according to strict security policies. The platform integrates real-time risk evaluation mechanisms capable of detecting threats such as prompt injection, data exfiltration attempts, and unauthorized access. It enforces Policy-as-Code authorization logic, allowing organizations to define granular control rules for AI actions and data access boundaries. Comprehensive security observability is ensured through detailed logging, alerting, and full audit trails, enabling forensic analysis, incident response, and compliance verification. Users will be able to: Intercept and control all AI agent operations through a secure orchestration layer. Evaluate the security risk of each agent action with context-aware detection for prompt manipulation and data misuse. Define and enforce authorization policies dynamically using a Policy-as-Code model. Access centralized dashboards with real-time alerts, risk scores, and complete historical audit logs for accountability and compliance.

Florentin Ledy 4 months ago
Low Priority
Planned
NIS2 Security Report Generation per Project
ntroduce the ability to generate NIS2 compliance and security posture reports for individual projects. This feature ensures alignment with the EU NIS2 Directive by evaluating the organization’s adherence to essential cybersecurity measures such as risk management, incident handling, supply chain security, and vulnerability management. The system will automatically correlate detected vulnerabilities, control gaps, and remediation activities with the relevant NIS2 Articles and Annex II security requirements, enabling continuous compliance monitoring. Users will be able to: Generate project-level or organization-wide NIS2 compliance reports to assess conformity with regulatory obligations. Identify missing technical and organizational measures required by NIS2, with prioritized recommendations for remediation. Export reports in various formats (PDF, JSON, HTML) for auditors, compliance officers, or regulatory submissions.

Florentin Ledy 4 months ago
Medium Priority
Planned
NIS2 Security Report Generation per Project
ntroduce the ability to generate NIS2 compliance and security posture reports for individual projects. This feature ensures alignment with the EU NIS2 Directive by evaluating the organization’s adherence to essential cybersecurity measures such as risk management, incident handling, supply chain security, and vulnerability management. The system will automatically correlate detected vulnerabilities, control gaps, and remediation activities with the relevant NIS2 Articles and Annex II security requirements, enabling continuous compliance monitoring. Users will be able to: Generate project-level or organization-wide NIS2 compliance reports to assess conformity with regulatory obligations. Identify missing technical and organizational measures required by NIS2, with prioritized recommendations for remediation. Export reports in various formats (PDF, JSON, HTML) for auditors, compliance officers, or regulatory submissions.

Florentin Ledy 4 months ago
Medium Priority
Completed
MITRE CWE Top 25 Security Report Generation per Project
Introduce the ability to generate CWE Top 25 security reports for individual projects. This feature will analyze detected vulnerabilities and map them to the latest MITRE CWE Top 25 Most Dangerous Software Weaknesses, providing detailed insights into the most critical weakness types affecting the codebase. Each report will include a breakdown of occurrences per CWE category, risk prioritization, and recommended remediation strategies aligned with secure coding best practices. Users will be able to: Generate project-level or organization-wide CWE Top 25 reports to evaluate exposure to the most critical software weaknesses. Track weakness trends over time to measure improvements in code quality and security posture. Export reports in multiple formats (PDF, JSON, HTML) for compliance documentation, management reporting, or integration into external systems.

Florentin Ledy 4 months ago
High Priority
Completed
MITRE CWE Top 25 Security Report Generation per Project
Introduce the ability to generate CWE Top 25 security reports for individual projects. This feature will analyze detected vulnerabilities and map them to the latest MITRE CWE Top 25 Most Dangerous Software Weaknesses, providing detailed insights into the most critical weakness types affecting the codebase. Each report will include a breakdown of occurrences per CWE category, risk prioritization, and recommended remediation strategies aligned with secure coding best practices. Users will be able to: Generate project-level or organization-wide CWE Top 25 reports to evaluate exposure to the most critical software weaknesses. Track weakness trends over time to measure improvements in code quality and security posture. Export reports in multiple formats (PDF, JSON, HTML) for compliance documentation, management reporting, or integration into external systems.

Florentin Ledy 4 months ago
High Priority
Completed
Branch Support for GitHub SaaS & GitLab SaaS
Extend CybeDefend’s SCM integrations with full branch support on GitHub SaaS and GitLab SaaS. This feature will: Allow users to select specific branches to scan instead of being limited to the default branch. Integrate seamlessly with Cybe Autofix, generating Pull Requests or Merge Requests against the correct branch with automated security patches.

Florentin Ledy 5 months ago
Completed
Branch Support for GitHub SaaS & GitLab SaaS
Extend CybeDefend’s SCM integrations with full branch support on GitHub SaaS and GitLab SaaS. This feature will: Allow users to select specific branches to scan instead of being limited to the default branch. Integrate seamlessly with Cybe Autofix, generating Pull Requests or Merge Requests against the correct branch with automated security patches.

Florentin Ledy 5 months ago
Completed
Support for French Language in the User Interface
CybeDefend will soon offer a French-language user interface, in addition to the existing English version. Users will be able to select their preferred language directly from their account settings. All key UI elements (menus, buttons, dashboards, error messages, reports, etc.) will be translated to provide a smoother and more accessible experience for French-speaking teams. Note: vulnerability descriptions (SCA, SAST, etc.) will initially remain in English to ensure accuracy. French translations of these technical contents are planned for a future release. This enhancement is part of our commitment to improving adoption in francophone and multilingual environments.

Florentin Ledy 8 months ago
Completed
Support for French Language in the User Interface
CybeDefend will soon offer a French-language user interface, in addition to the existing English version. Users will be able to select their preferred language directly from their account settings. All key UI elements (menus, buttons, dashboards, error messages, reports, etc.) will be translated to provide a smoother and more accessible experience for French-speaking teams. Note: vulnerability descriptions (SCA, SAST, etc.) will initially remain in English to ensure accuracy. French translations of these technical contents are planned for a future release. This enhancement is part of our commitment to improving adoption in francophone and multilingual environments.

Florentin Ledy 8 months ago
Completed
Support for GitLab SaaS as a Source Code Management (SCM) Provider
CybeDefend will soon support integration with GitLab.com (SaaS), in addition to the already supported GitHub platform. This integration will enable automatic analysis of projects hosted on GitLab, including: Import of GitLab repositories Triggering of scans on push event

Florentin Ledy 8 months ago
High Priority
Completed
Support for GitLab SaaS as a Source Code Management (SCM) Provider
CybeDefend will soon support integration with GitLab.com (SaaS), in addition to the already supported GitHub platform. This integration will enable automatic analysis of projects hosted on GitLab, including: Import of GitLab repositories Triggering of scans on push event

Florentin Ledy 8 months ago
High Priority
Completed
Support for Private Container Registries (GCR, Docker Hub, ACR)
CybeDefend will soon support scanning containers hosted in the following private registries: Google Container Registry (GCR) Docker Hub (private mode) Azure Container Registry (ACR) Users will be able to securely configure access using encrypted credentials, tokens, or cloud identities. This will allow CybeDefend to pull images directly from private repositories and automatically perform SCA and vulnerability scans on containerized artifacts. This feature will extend our DevSecOps coverage across hybrid and multi-cloud environments.

Florentin Ledy 8 months ago
High Priority
Completed
Support for Private Container Registries (GCR, Docker Hub, ACR)
CybeDefend will soon support scanning containers hosted in the following private registries: Google Container Registry (GCR) Docker Hub (private mode) Azure Container Registry (ACR) Users will be able to securely configure access using encrypted credentials, tokens, or cloud identities. This will allow CybeDefend to pull images directly from private repositories and automatically perform SCA and vulnerability scans on containerized artifacts. This feature will extend our DevSecOps coverage across hybrid and multi-cloud environments.

Florentin Ledy 8 months ago
High Priority
Planned
ALPHA - Business Logic Security Analysis (BLSA)
CybeDefend introduces Business Logic Security Analysis (BLSA), an advanced AI-powered security technology designed to detect flaws related to your application's business logic. Unlike traditional tools (SAST, IaC, SCA), BLSA understands the functional context of your software architecture and identifies vulnerabilities that rule-based approaches cannot detect — such as payment bypasses, privilege escalation, or exploitable workflow transitions. The system is based on: Specialized AI agents, each analyzing different parts of the code in parallel to build a coherent mental model. Split prompting, which intelligently segments large monorepos or microservices for exhaustive analysis. Smart correlation of findings to produce a unified, contextualized, and actionable report. BLSA helps to: Reduce the need for costly manual audits. Enhance DevSecOps pipelines by combining technical and business logic analysis. Achieve deeper security coverage early in the development lifecycle. This feature will be initially available through an early access program for selected users.

Florentin Ledy 8 months ago
Medium Priority
Planned
ALPHA - Business Logic Security Analysis (BLSA)
CybeDefend introduces Business Logic Security Analysis (BLSA), an advanced AI-powered security technology designed to detect flaws related to your application's business logic. Unlike traditional tools (SAST, IaC, SCA), BLSA understands the functional context of your software architecture and identifies vulnerabilities that rule-based approaches cannot detect — such as payment bypasses, privilege escalation, or exploitable workflow transitions. The system is based on: Specialized AI agents, each analyzing different parts of the code in parallel to build a coherent mental model. Split prompting, which intelligently segments large monorepos or microservices for exhaustive analysis. Smart correlation of findings to produce a unified, contextualized, and actionable report. BLSA helps to: Reduce the need for costly manual audits. Enhance DevSecOps pipelines by combining technical and business logic analysis. Achieve deeper security coverage early in the development lifecycle. This feature will be initially available through an early access program for selected users.

Florentin Ledy 8 months ago
Medium Priority