Eli Guardian

Security That Thinks Like a Defender

Zero-dependency Python security scanner. STRIDE threat modeling. Agents of Chaos detection.

Get Started Free Learn More

Built for Modern Security

⚑

Zero Dependencies

Pure Python, no external libraries. Install once, run anywhere. Minimal attack surface, maximum compatibility.

🧠

Semantic Analysis

Understand your code's meaning, not just syntax. Detect logical vulnerabilities and security anti-patterns.

🎯

STRIDE Mapping

Automatically categorize threats: Spoofing, Tampering, Repudiation, Info Disclosure, Denial of Service, Elevation.

πŸ”„

CI/CD Integration

Seamless GitHub Actions, GitLab CI, Jenkins integration. Fail builds on critical issues automatically.

πŸ“Š

Portfolio Scoring

Track security metrics across multiple projects. See your overall security posture at a glance.

πŸ”§

Auto-Fix Mode

Not just detectionβ€”get suggestions and automatic fixes for common vulnerability patterns.

See It In Action

$ eli-guardian scan src/
βœ“ Scanning 12 files...
β†’ Running STRIDE analysis
β†’ Checking for Agent patterns
β†’ Generating report
⚠ 2 High-Risk Issues Found
[STRIDE: Tampering] SQL Injection in user_handler.py:45
Use parameterized queries instead of string concatenation
[STRIDE: Elevation] Weak auth in api.py:128
Add rate limiting and token expiration
πŸ“Š Security Score: 7.2/10
πŸ”§ Auto-fixes available for 1 issue

Flexible Plans

Free

$0/mo

Perfect for startups

  • 3 Projects
  • Basic Scanning
  • Email Reports
  • Community Support
Get Started

Enterprise

$99/mo

Full enterprise suite

  • Everything in Pro
  • REST API Access
  • Custom Security Rules
  • SLA & Support
  • On-Premise Option
Get Started

Frequently Asked Questions

Do I need to install dependencies?

No! Eli Guardian is pure Python with zero external dependencies. Download, unzip, and scan. It's that simple. Works on Python 3.8+.

What languages can it scan?

Currently optimized for Python with semantic analysis. We're expanding to JavaScript, Go, and Rust. Contact us for enterprise language support.

How does STRIDE mapping work?

We analyze your code against Microsoft's STRIDE threat model. Each issue is automatically categorized as Spoofing, Tampering, Repudiation, Information Disclosure, Denial of Service, or Elevation of Privilege.

Can I use this in CI/CD?

Yes! We have plugins for GitHub Actions, GitLab CI, Jenkins, and more. Fail builds on critical issues, create reports, and integrate with your workflow seamlessly.

What about false positives?

Our semantic analyzer is trained to reduce noise. You can also whitelist specific issues and configure rules to match your security standards.

Is my code analyzed privately?

Completely. Code never leaves your machine in free/pro tiers. Enterprise customers can opt for full on-premise deployment.