ShieldX Product Manual
Security scanning that developers can run in 60 seconds. From setup to advanced configuration.
What is ShieldX?
ShieldX is security that developers actually want to use. Built for startups, it provides 14 integrated modules—from detecting hardcoded secrets to container security, infrastructure-as-code scanning, SBOM generation, and compliance reporting. It's drastically cheaper and faster than legacy enterprise platforms, requiring zero dedicated security headcount to get started.
Key Capabilities
- Secrets detection with entropy analysis
- Real-time CVE scanning
- Cloud security posture assessment
- API endpoint OWASP compliance testing
- AST-based SAST with taint tracking
- AI-powered security review
- Container & Dockerfile security
- Infrastructure-as-Code scanning
- SBOM generation (CycloneDX)
- Compliance mapping (8 frameworks)
- Log-based threat detection
- CI/CD pipeline integration
- Custom rule engine
- Unified security scoring
Privacy Guarantees
- Zero code storage — code is never saved
- No data retention on servers
- HTTPS only with TLS 1.2+
- No third-party data sharing
- SOC 2 ready architecture
- GDPR compliant data handling
Subscription Plans
Demo mode + basic secrets scanner
All 14 modules incl. AST-based SAST, AI review, unlimited scans
Team management, CI/CD gate, SLA, priority support
Getting Started by Plan
Free Demo
Use the guided demo workspace with sample code, sample dependencies, and example results. This keeps free visitors out of the paid workspace while still showing the full product flow.
Pro Workspace
Run real scans on your own code, dependency manifests, API targets, and security workflows. Save score snapshots and export reports.
Enterprise Rollout
Create the Enterprise workspace, invite team members, assign seat roles, and keep onboarding and support aligned to the organization owner account.
What the Paid Workspace Looks Like
These preview cards mirror the kind of result summaries, saved reports, and team controls customers see in the paid ShieldX workspace.
A paid workspace combines module results into one security score with saved snapshots and export-ready summaries.
Pro and Enterprise accounts can save scan history and create reports that look ready to share with engineering or leadership.
Enterprise accounts get the team panel with workspace naming, seat tracking, invite management, and owner/admin controls.
Secrets ScannerModule 1/14
Detect hardcoded secrets, API keys, tokens, and credentials in your source code
Features
How to Use
What's Covered
Dependency ScannerModule 2/14
Find known vulnerabilities (CVEs) in your project dependencies using real-time CVE data
Features
How to Use
What's Covered
Cloud Security AssessmentModule 3/14
Interactive security checklist for AWS, GCP, Azure, and general cloud infrastructure
Features
How to Use
What's Covered
API Security ScannerModule 4/14
Test any HTTP endpoint against OWASP API Top 10 2023 security standards
Features
How to Use
What's Covered
Log Threat AnalyzerModule 5/14
AI-powered pattern detection to find security threats in your application logs
Features
How to Use
What's Covered
SAST Code AnalyzerModule 6/14
AST-based static analysis with multi-file project scanning, cross-file taint tracking, and exploit proof-of-concept generation
Features
How to Use
What's Covered
CI/CD IntegrationModule 7/14
Ready-to-use pipeline templates for automated security scanning in your CI/CD
Features
How to Use
What's Covered
AI Security ReviewModule 8/14
AI-powered deep security review that finds business logic flaws, authorization gaps, IDOR, race conditions, and vulnerabilities that no pattern-based SAST tool can detect
Features
How to Use
What's Covered
License Compliance ScannerModule 9/14
Scan your dependency manifests to identify open source license obligations and compliance risks
Features
How to Use
What's Covered
Security Score DashboardModule 10/14
Unified security posture score across all ShieldX modules with radar visualization
Features
How to Use
What's Covered
Container SecurityModule 11/14
Dockerfile security scanner with 15 checks based on CIS Docker Benchmark.
Features
How to Use
What's Covered
IaC ScannerModule 12/14
Infrastructure-as-Code misconfiguration scanner for Terraform, CloudFormation, and Kubernetes.
Features
How to Use
What's Covered
SBOM GeneratorModule 13/14
Generate CycloneDX 1.5 Software Bill of Materials from dependency manifests.
Features
How to Use
What's Covered
Compliance ReportModule 14/14
Map scan findings to SOC 2, ISO 27001, PCI-DSS, HIPAA, NIST 800-53, CIS, and GDPR.
Features
How to Use
What's Covered
Privacy & Security Policy
ShieldX is built with a zero code storage architecture. Your intellectual property is never at risk.
Zero Code Storage
Your source code is analyzed in real-time memory and immediately discarded after scanning. It is never written to disk, logged, or stored in any database.
No Data Retention
Scan results are returned directly to your browser session. We do not retain copies of your findings, code snippets, or dependency lists on our servers.
HTTPS Only
All data transmission between your browser and ShieldX is encrypted via TLS 1.2+ (HTTPS). We enforce HSTS with a minimum 1-year max-age.
No Third-Party Sharing
Your data is never sold, shared, or transmitted to third parties. Dependency queries are anonymized and contain only package name/version pairs — no source code.
Session-Based Authentication
ShieldX uses JWT-based session tokens with configurable expiry. Sessions are server-validated and cannot be forged.
SOC 2 Ready Architecture
Our infrastructure follows SOC 2 Type II controls including access management, change management, and monitoring.
Frequently Asked Questions
Yes. ShieldX has a strict Zero Code Storage policy. Your code is processed in-memory and immediately discarded. We never log, store, or transmit your source code to any third party.
The scanner uses 20+ curated regex patterns combined with Shannon entropy analysis and placeholder detection. High-confidence matches have very low false positive rates. Low-confidence matches are clearly labeled and collapsed by default.
Yes. Every query runs against a real-time vulnerability database. Vulnerabilities shown are actual CVEs from the National Vulnerability Database.
Yes. ShieldX provides ready-to-use templates for GitHub Actions and GitLab CI, plus cURL commands for any CI system. Failed security checks return exit code 1 to fail your pipeline.
AWS, GCP, Azure, and general cloud infrastructure. Each platform has specific checks for storage, identity, network, database, logging, and encryption.
Each module produces a score from 0-10 based on penalty deductions. Critical findings deduct 3 points, High deducts 2, Medium deducts 1. The overall score is the average across all scanning dimensions.
Custom Rules let you create your own detection patterns, suppress false positives, or add organization-specific security checks. Rules are written as regex patterns and are applied automatically during every SAST scan. You can manage up to 100 rules per account.
The AI Executive Summary uses Google Gemini to translate security scan results into clear, actionable intelligence. It generates a risk assessment, prioritized fix order, and key insights suitable for engineering leads and non-technical stakeholders.
The Compliance Report module maps findings to 8 frameworks: SOC 2 Type II, ISO 27001, PCI DSS 4.0, HIPAA, NIST 800-53, CIS Benchmarks, GDPR, and OWASP Top 10. Each framework shows control-level compliance scores.
Everything in Pro plus: team management (up to 25 seats), priority support (< 4hr response), custom integrations, dedicated account manager, 99.9% SLA, white-label reports, and on-premise deployment option.
Yes. Both Pro and Enterprise plans can be cancelled at any time. Contact support for details.