Average Ratings 1 Rating
Average Ratings 2 Ratings
Description
Velocity provides detailed, contextual analytics that enable engineering leaders to help their team members, resolve team roadblocks and streamline engineering processes. Engineering leaders can get actionable metrics. Velocity transforms data from commits to pull requests into the insights that you need to make lasting improvements in your team's productivity. Quality: Automated code reviews for test coverage, maintainability, and more so you can save time and merge with confidence. Automated code review comments for pull requests. Our 10-point technical debt assessment gives you real-time feedback so that you can focus on the important things in your code review discussions. You can get perfect coverage every time. Check coverage line-by-line within diffs. Never merge code again without passing sufficient tests. You can quickly identify files that are frequently modified and have poor coverage or maintainability issues. Each day, track your progress towards measurable goals.
Description
ZeroPath (YC S24) is an AI-native application security platform that delivers comprehensive code protection beyond traditional SAST. Founded by security engineers from Tesla and Google, ZeroPath combines large language models with deep program analysis to deliver intelligent security testing that finds real vulnerabilities while dramatically reducing false positives.
Unlike traditional SAST tools that rely on pattern matching, ZeroPath understands code context, business logic, and developer intent. This enables identification of sophisticated security issues including business logic flaws, broken authentication, authorization bypasses, and complex dependency vulnerabilities.
Our comprehensive security suite covers the application security lifecycle:
1. AI-powered SAST
2. Software Composition Analysis with reachability analysis
3. Secrets detection and validation
4. Infrastructure as Code scanning
5. Automated PR reviews
6. Automated patch generation
and more...
ZeroPath integrates seamlessly with GitHub, GitLab, Bitbucket, Azure DevOps and many more. The platform handles codebases with millions of lines across Python, JavaScript, TypeScript, Java, Go, Ruby, Rust, PHP, Kotlin and more.
Our research team has been successful in finding vulnerabilities like critical account takeover in better-auth (CVE-2025-61928, 300k+ weekly downloads), identifying 170+ verified bugs in curl, and discovering 0-days in production systems at Netflix, Hulu, and Salesforce.
Trusted by 750+ companies and performing 200k+ code scans monthly.
API Access
Has API
API Access
Has API
Integrations
Asana
GitHub
Jira
Slack
Betterscan.io
Bitbucket
Checkmarx
Cursor
DeepCover
Docker
Integrations
Asana
GitHub
Jira
Slack
Betterscan.io
Bitbucket
Checkmarx
Cursor
DeepCover
Docker
Pricing Details
No price information available.
Free Trial
Free Version
Pricing Details
Free
Free Trial
Free Version
Deployment
Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook
Deployment
Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook
Customer Support
Business Hours
Live Rep (24/7)
Online Support
Customer Support
Business Hours
Live Rep (24/7)
Online Support
Types of Training
Training Docs
Webinars
Live Training (Online)
In Person
Types of Training
Training Docs
Webinars
Live Training (Online)
In Person
Vendor Details
Company Name
Code Climate
Founded
2011
Country
United States
Website
codeclimate.com
Vendor Details
Company Name
ZeroPath
Founded
2024
Country
United States
Website
zeropath.com
Product Features
Application Lifecycle Management
Administrator Level Control
Defect Tracking
Iteration Planning
Project Management
Release Management
Requirements Review
Task Management
Test Case Tracking
User Level Management
Version Control
Application Performance Monitoring (APM)
Baseline Manager
Diagnostic Tools
Full Transaction Diagnostics
Performance Control
Resource Management
Root-Cause Diagnosis
Server Performance
Trace Individual Transactions
Continuous Integration
Build Log
Change Management
Configuration Management
Continuous Delivery
Continuous Deployment
Debugging
Permission Management
Quality Assurance Management
Testing Management
Data Visualization
Analytics
Content Management
Dashboard Creation
Filtered Views
OLAP
Relational Display
Simulation Models
Visual Discovery
DevOps
Approval Workflow
Dashboard
KPIs
Policy Management
Portfolio Management
Prioritization
Release Management
Timeline Management
Troubleshooting Reports
IT Project Management
Bug Tracking
Issue Management
Milestone Tracking
Percent-Complete Tracking
Portfolio Management
Prioritization
Product Roadmapping
Requirements Management
Resource Management
Status Tracking
Supports Agile
Supports Scrum
Task Management
Testing / QA Management
Time & Expense Tracking
Product Management
Collaboration
Feedback Collection
Idea Management
Milestone Tracking
Prioritization
Product Roadmapping
Release Management
Requirements Management
Resource Management
Workflow Management
Static Code Analysis
Analytics / Reporting
Code Standardization / Validation
Multiple Programming Language Support
Provides Recommendations
Standard Security/Industry Libraries
Vulnerability Management
Product Features
Application Security
Analytics / Reporting
Open Source Component Monitoring
Source Code Analysis
Third-Party Tools Integration
Training Resources
Vulnerability Detection
Vulnerability Remediation
Cybersecurity
AI / Machine Learning
Behavioral Analytics
Endpoint Management
IOC Verification
Incident Management
Tokenization
Vulnerability Scanning
Whitelisting / Blacklisting
Static Application Security Testing (SAST)
Application Security
Dashboard
Debugging
Deployment Management
IDE
Multi-Language Scanning
Real-Time Analytics
Source Code Scanning
Vulnerability Scanning
Static Code Analysis
Analytics / Reporting
Code Standardization / Validation
Multiple Programming Language Support
Provides Recommendations
Standard Security/Industry Libraries
Vulnerability Management
Vulnerability Scanners
Asset Discovery
Black Box Scanning
Compliance Monitoring
Continuous Monitoring
Defect Tracking
Interactive Scanning
Logging and Reporting
Network Mapping
Perimeter Scanning
Risk Analysis
Threat Intelligence
Web Inspection