Skip to content

Commit 1e69682

Browse files
shivasuryaclaude
andauthored
docs: improve README clarity and consistency across all components (#487)
- Update main README to position Code Pathfinder as AI-Native SAST for modern security teams - Expand use cases: CVE detection, MCP server for AI assistants, in-editor checks, CI/CD - Explain AST/CFG/DFG terminology for better understanding - Restructure "Components" to "Tools and workflows" with detailed descriptions - Add MCP server links (codepathfinder.dev/mcp) in relevant sections - Standardize terminology: "Python DSL" → "Python SDK" across all docs - Simplify SecureFlow extension and CLI READMEs for better readability - Remove promotional language and make content more direct and actionable Co-authored-by: Claude Sonnet 4.5 <noreply@anthropic.com>
1 parent e50430d commit 1e69682

File tree

4 files changed

+97
-82
lines changed

4 files changed

+97
-82
lines changed

README.md

Lines changed: 43 additions & 28 deletions
Original file line numberDiff line numberDiff line change
@@ -16,41 +16,56 @@
1616

1717
# [Code Pathfinder](https://codepathfinder.dev)
1818

19-
With AI tools generating thousands of lines of code in seconds, the bottleneck has shifted from writing code to reviewing and securing it at scale. Traditional static analysis tools struggle with modern AI-generated codebases that mix languages, frameworks, and infrastructure-as-code in the same repository.
19+
AI-Native static code analysis for modern security teams.
2020

21-
Code Pathfinder flips this model. Instead of brittle regex or AST pattern matching per language, it indexes your entire codebase as structured, queryable data (AST, CFG, DFG). Write language-agnostic queries that trace data flows across Python, [Dockerfiles](https://codepathfinder.dev/registry), and [docker-compose](https://codepathfinder.dev/blog/announcing-docker-compose-security-rules) in a single rule—critical for CVE detection and vulnerability research when you need to understand how dependencies are used, what privileges they run with, and what attack surface they expose.
21+
Code Pathfinder is an open-source security scanner that builds a queryable graph of your codebase. It parses code into Abstract Syntax Trees (AST), builds Control Flow Graphs (CFG) to track execution paths, and constructs Data Flow Graphs (DFG) to trace how data moves through your application. Instead of regex pattern matching per language, it indexes the entire codebase as structured data and lets you write queries that trace data flows across Python, [Dockerfiles](https://codepathfinder.dev/registry), and [docker-compose](https://codepathfinder.dev/blog/announcing-docker-compose-security-rules) files in a single rule.
2222

23-
## What it is
23+
**Use it for:**
24+
- **CVE detection and vulnerability research**: Understand how dependencies are used, what privileges they run with, and what attack surface they expose
25+
- **[MCP server](https://codepathfinder.dev/mcp) for AI coding assistants**: Provides code intelligence to Claude, GPT, and other AI assistants - more context than LSP, focused on security and data flow
26+
- **In-editor security checks**: Catch vulnerable patterns as you write code in VS Code
27+
- **CI/CD pipelines**: Automated security scanning with SARIF output for GitHub Advanced Security, DefectDojo integration
28+
- **Custom security rules**: Write project-specific rules in Python to detect patterns that matter to your team
2429

25-
- **[Open-source SAST](https://codepathfinder.dev)** that combines structural analysis (call graphs, dataflow, taint tracking) with AI to [understand real exploit paths](https://codepathfinder.dev/blog/static-analysis-isnt-enough-understanding-library-interactions-for-effective-data-flow-tracking), not just regex hits.
26-
- **AI-powered vulnerability hunting** via [SecureFlow](https://codepathfinder.dev/secureflow-ai), which layers 10+ models (Claude, GPT, Gemini, Grok, Ollama, etc.) on top of deterministic analysis for [context-aware triage](https://codepathfinder.dev/blog/introducing-secureflow-cli-to-hunt-vuln).
27-
- **Developer-first workflow** with [IDE integration](https://codepathfinder.dev/docs/quickstart), CLI, and CI support so security checks land where code is written and reviewed.
30+
## What it does
2831

29-
## Why it's different
32+
- **Structural analysis**: Builds call graphs, dataflow graphs, and taint tracking to [find exploit paths](https://codepathfinder.dev/blog/static-analysis-isnt-enough-understanding-library-interactions-for-effective-data-flow-tracking) through your code, not just pattern matches.
33+
- **AI-powered triage**: [SecureFlow](https://codepathfinder.dev/secureflow-ai) runs LLMs (Claude, GPT, Gemini, Grok, Ollama, etc.) on top of the structural analysis for [context-aware validation](https://codepathfinder.dev/blog/introducing-secureflow-cli-to-hunt-vuln).
34+
- **IDE and CLI**: Works in [VS Code](https://codepathfinder.dev/docs/quickstart), from the command line, and in CI/CD pipelines.
3035

31-
- **Graph-first engine**: builds a rich representation of [functions, endpoints, DB calls, and dataflows](https://codepathfinder.dev/blog/static-analysis-isnt-enough-understanding-library-interactions-for-effective-data-flow-tracking) to cut false positives and surface real source‑to‑sink issues.
32-
- **LLM as validator, not oracle**: uses models to [explain, prioritize, and validate findings](https://github.blog/ai-and-ml/llms/how-ai-enhances-static-application-security-testing-sast/) after structural analysis, keeping behavior predictable and reproducible.
33-
- **Privacy‑first, BYOK**: your code stays local; you [bring your own keys](https://codepathfinder.dev/secureflow-ai) and talk directly to providers with no vendor-side code ingestion.
36+
## How it's different
3437

35-
## Where it fits in your stack
38+
- **Call graphs and dataflow**: Indexes [functions, endpoints, DB calls, and dataflows](https://codepathfinder.dev/blog/static-analysis-isnt-enough-understanding-library-interactions-for-effective-data-flow-tracking) to trace source-to-sink vulnerabilities instead of matching syntax patterns.
39+
- **LLMs validate, don't detect**: The structural analysis finds potential issues; [LLMs explain and prioritize](https://github.blog/ai-and-ml/llms/how-ai-enhances-static-application-security-testing-sast/) them. This keeps results reproducible.
40+
- **Your code stays local**: You [bring your own API keys](https://codepathfinder.dev/secureflow-ai) and talk directly to providers. No vendor-side code ingestion.
3641

37-
- **Local & IDE**: SecureFlow VS Code extension ([VS Code Marketplace](https://marketplace.visualstudio.com/items?itemName=codepathfinder.secureflow) | [Open VSX](https://open-vsx.org/extension/codepathfinder/secureflow)) for real‑time security feedback as you type.
38-
- **CLI & agents**: [SecureFlow CLI](https://www.npmjs.com/package/@codepathfinder/secureflow-cli) runs agentic loops over your repo (profile, read, trace, validate) to hunt vulnerabilities with the same ergonomics as modern AI coding tools.
39-
- **Pipelines & reporting**: integrates into CI/CD and exports to formats and systems like SARIF, [GitHub Advanced Security](https://github.com/shivasurya/code-pathfinder), and DefectDojo so findings flow into existing governance.
42+
## Where to use it
4043

41-
## Project components
44+
- **AI coding assistants**: Run as an [MCP server](https://codepathfinder.dev/mcp) to give Claude Code, Cline, or other AI assistants deep code intelligence (call graphs, data flows, security patterns) beyond what LSP provides
45+
- **In-editor**: SecureFlow VS Code extension ([VS Code Marketplace](https://marketplace.visualstudio.com/items?itemName=codepathfinder.secureflow) | [Open VSX](https://open-vsx.org/extension/codepathfinder/secureflow)) runs security checks as you type and catches vulnerable patterns before commit
46+
- **Command line**: [SecureFlow CLI](https://www.npmjs.com/package/@codepathfinder/secureflow-cli) runs agentic loops over your repo to profile, read, trace, and validate vulnerabilities
47+
- **CI/CD pipelines**: Exports to SARIF for [GitHub Advanced Security](https://github.com/shivasurya/code-pathfinder), integrates with DefectDojo, and supports custom rules for automated security gates
4248

43-
- **[Code Pathfinder CLI](https://codepathfinder.dev/blog/codeql-oss-alternative)** – structural security scanner and query engine for code graphs, better than grep/AST‑only search for paths and patterns.
44-
- **[SecureFlow CLI](https://www.npmjs.com/package/@codepathfinder/secureflow-cli)** – AI‑powered vulnerability hunter that uses agent loops and 10+ models for deep, context‑aware scans across real projects.
45-
- **SecureFlow VS Code extension** ([VS Code Marketplace](https://marketplace.visualstudio.com/items?itemName=codepathfinder.secureflow) | [Open VSX](https://open-vsx.org/extension/codepathfinder/secureflow)) – in‑editor experience for running scans, reviewing traces, and getting AI‑validated security insights without leaving your workspace.
46-
- **[Custom Rules](https://codepathfinder.dev/docs/rules)** – write your own security rules using the PathFinder query language to detect project-specific vulnerabilities and patterns.
49+
## Tools and workflows
50+
51+
**[Code Pathfinder CLI](https://codepathfinder.dev/blog/codeql-oss-alternative)**
52+
The core scanner and query engine. Run it three ways: `scan` mode for security analysis with custom rules, `serve` mode as an [MCP server](https://codepathfinder.dev/mcp) for AI coding assistants (Claude Code, Cline), or `ci` mode in GitHub Actions and CI/CD pipelines. Indexes your codebase into call graphs and data flows, then runs Python-based security rules to find source-to-sink vulnerabilities.
53+
54+
**[SecureFlow CLI](https://www.npmjs.com/package/@codepathfinder/secureflow-cli)**
55+
AI-powered vulnerability scanner that runs multi-turn analysis loops. First profiles your project to detect the stack (Django, Flask, FastAPI, etc.), then iteratively requests relevant files, traces data flows, and uses LLMs (Claude, GPT, Gemini, Grok, Ollama) to identify and explain security issues. Exports findings to JSON, SARIF, or DefectDojo format.
56+
57+
**SecureFlow VS Code extension** ([Marketplace](https://marketplace.visualstudio.com/items?itemName=codepathfinder.secureflow) | [Open VSX](https://open-vsx.org/extension/codepathfinder/secureflow))
58+
In-editor security analysis. Right-click to scan files or profiles, review findings in a sidebar with severity levels, file locations, and fix recommendations. Uses the same AI models as SecureFlow CLI. Catches SQL injection, XSS, deserialization bugs, and other OWASP Top 10 issues as you code.
59+
60+
**[Custom Rules](https://codepathfinder.dev/docs/rules)**
61+
Write security rules in Python using the PathFinder SDK. Query the code graph with `find_symbol()`, trace calls with `get_callees()` and `get_callers()`, check for vulnerable patterns. Rules run during `scan` or `ci` commands. See [rule registry](https://codepathfinder.dev/registry) for 50+ examples (SQL injection, RCE, privilege escalation, container misconfigurations).
4762

4863
## Supported Languages
4964

50-
- **[Python](https://codepathfinder.dev/registry/python)** Full support for security analysis and vulnerability detection
51-
- **[Docker](https://codepathfinder.dev/registry/docker)** Dockerfile security scanning
52-
- **[Docker Compose](https://codepathfinder.dev/registry/docker-compose)** Configuration analysis and security checks
53-
- **Go** Coming soon
65+
- **[Python](https://codepathfinder.dev/registry/python)**: Full support for security analysis and vulnerability detection
66+
- **[Docker](https://codepathfinder.dev/registry/docker)**: Dockerfile security scanning
67+
- **[Docker Compose](https://codepathfinder.dev/registry/docker-compose)**: Configuration analysis and security checks
68+
- **Go**: Coming soon
5469

5570
## Installation
5671

@@ -64,7 +79,7 @@ brew install shivasurya/tap/pathfinder
6479

6580
### pip
6681

67-
Install via pip to get **both** the CLI binary and Python DSL for writing security rules.
82+
Install via pip to get both the CLI binary and Python SDK for writing security rules.
6883

6984
```bash
7085
pip install codepathfinder
@@ -76,8 +91,8 @@ pip install codepathfinder
7691
# Test CLI binary
7792
pathfinder --version
7893

79-
# Test Python DSL
80-
python -c "from codepathfinder import rule, calls; print('DSL OK')"
94+
# Test Python SDK
95+
python -c "from codepathfinder import rule, calls; print('SDK OK')"
8196
```
8297

8398
**Supported platforms:** Linux (x86_64, aarch64), macOS (Intel, Apple Silicon), Windows (x64)
@@ -150,9 +165,9 @@ pathfinder scan --rules rules/ --project . --fail-on=critical,high
150165

151166
## GitHub Action
152167

153-
Add security scanning to your CI/CD pipeline in just a few lines.
168+
Add security scanning to your CI/CD pipeline.
154169

155-
**Best Practice:** Pin to a specific version (e.g., `@v1.2.0`) for stability and reproducibility. Using `@main` will always pull the latest changes, which may introduce breaking changes.
170+
**Best Practice:** Pin to a specific version (e.g., `@v1.2.0`) instead of `@main` to avoid breaking changes.
156171

157172
```yaml
158173
# .github/workflows/security-scan.yml

extension/secureflow/README.md

Lines changed: 12 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -9,17 +9,17 @@
99

1010
# SecureFlow AI
1111

12-
[SecureFlow AI](https://codepathfinder.dev/secureflow-ai) is your AI security copilot for smarter, safer code, right in your editor. This VS Code extension helps you identify potential security vulnerabilities in your code directly within your development workflow.
12+
[SecureFlow AI](https://codepathfinder.dev/secureflow-ai) is a VS Code extension that runs AI-powered security analysis on your code. It finds potential vulnerabilities without leaving your editor.
1313

1414
## Features
1515

16-
- **Profile-Based Scanning**: Automatically detect your project stack and run targeted security analysis
17-
- **Multi-Provider Support**: Choose from Anthropic Claude, OpenAI, Google Gemini, or OpenRouter for 200+ models
18-
- **Modern UI**: Beautiful Svelte-based interface with intuitive navigation and real-time updates
19-
- **Comprehensive Reports**: View detailed vulnerability reports with severity ratings, file locations, and actionable recommendations
20-
- **Quick Analysis**: Run security analysis on git changes or full workspace scans
16+
- **Profile-Based Scanning**: Detects your project stack and runs targeted security analysis
17+
- **Multi-Provider Support**: Works with Anthropic Claude, OpenAI, Google Gemini, or OpenRouter (200+ models)
18+
- **Svelte UI**: Interface with intuitive navigation and real-time updates
19+
- **Detailed Reports**: Vulnerability reports include severity ratings, file locations, and recommendations
20+
- **Quick Analysis**: Run security scans on git changes or full workspace
2121
- **Scan History**: Track all security scans with auto-incrementing scan numbers and profile linkage
22-
- **In-Editor Experience**: All analysis happens right in your VS Code editor with no context switching
22+
- **In-Editor**: All analysis runs in VS Code with no context switching
2323

2424
## Getting Started
2525

@@ -37,9 +37,9 @@ Configure your AI provider in VS Code settings:
3737
- `secureflow.APIKey`: Your API key for the selected provider
3838

3939
**Supported Providers:**
40-
- **Anthropic Claude**: Industry-leading security analysis with Claude Sonnet 4.5 (recommended)
41-
- **OpenAI**: Access GPT-4o, o1, and other OpenAI models
42-
- **Google Gemini**: Use Gemini 2.5 Pro or Flash models
40+
- **Anthropic Claude**: Claude Sonnet 4.5 (recommended)
41+
- **OpenAI**: GPT-4o, o1, and other OpenAI models
42+
- **Google Gemini**: Gemini 2.5 Pro or Flash models
4343
- **OpenRouter**: Access 200+ models from multiple providers through a single API
4444

4545
**Getting API Keys:**
@@ -63,8 +63,8 @@ Configure your AI provider in VS Code settings:
6363
**View Results:**
6464
- Navigate to the Results tab to see all scan history
6565
- Click on any scan to view detailed vulnerability findings
66-
- Review severity levels: Critical 🔴, High 🟠, Medium 🟡, Low 🔵, Info ℹ️
66+
- Review severity levels: Critical, High, Medium, Low, Info
6767

6868
## License Notice
6969

70-
For full license terms, see the [LICENSE](LICENSE) file
70+
For full license terms, see the [LICENSE](LICENSE) file

extension/secureflow/packages/secureflow-cli/README.md

Lines changed: 32 additions & 32 deletions
Original file line numberDiff line numberDiff line change
@@ -8,20 +8,20 @@
88

99
# SecureFlow CLI
1010

11-
🛡️ **AI-Powered Security Analysis for Your Codebase**
11+
AI-powered security analysis for your codebase from the command line.
1212

13-
SecureFlow CLI is a powerful command-line tool that performs comprehensive security analysis of your projects using advanced AI models. It intelligently analyzes your code structure, identifies vulnerabilities, and provides actionable security insights with a beautiful TUI interface.
13+
SecureFlow CLI runs security analysis on your projects using AI models. It analyzes code structure, identifies vulnerabilities, and provides actionable security insights with a TUI interface.
1414

15-
## Features
15+
## Features
1616

17-
- 🤖 **AI-Powered Analysis** - Supports 13+ AI models including Claude, GPT, and Gemini
18-
- 🔍 **Intelligent File Discovery** - Smart project analysis with iterative file request system
19-
- 🎯 **Comprehensive Scanning** - Full project security analysis with context-aware insights
20-
- 📊 **Multiple Output Formats** - Text, JSON, and DefectDojo integration
21-
- 🏗️ **Project Profiling** - Technology stack detection and application type identification
22-
- 🎨 **Beautiful TUI** - Claude-style terminal interface with colored output and progress indicators
17+
- **13+ AI models** - Supports Claude, GPT, Gemini, Grok, and Ollama models
18+
- **Smart file discovery** - Iterative file request system that reads only what's needed
19+
- **Full project scanning** - Context-aware security analysis
20+
- **Multiple output formats** - Text, JSON, and DefectDojo integration
21+
- **Project profiling** - Detects technology stack and application type
22+
- **TUI interface** - Claude-style terminal output with colored progress indicators
2323

24-
## 🚀 Quick Start
24+
## Quick Start
2525

2626
### 1. Installation
2727

@@ -68,11 +68,11 @@ secureflow scan ./my-project --model claude-sonnet-4-5-20250929
6868
secureflow profile ./my-project
6969
```
7070

71-
## 📋 Commands
71+
## Commands
7272

7373
### `scan` - Security Analysis
7474

75-
Performs comprehensive AI-powered security analysis of your project.
75+
Runs AI-powered security analysis on your project.
7676

7777
```bash
7878
secureflow scan [path] [options]
@@ -123,7 +123,7 @@ secureflow config --show # Show masked configuration
123123
secureflow config --show --raw # Show raw configuration (use with caution)
124124
```
125125

126-
## 🔧 Configuration
126+
## Configuration
127127

128128
SecureFlow CLI stores configuration in a local config file. The location is shown when running `secureflow config --show`.
129129

@@ -146,7 +146,7 @@ SecureFlow CLI stores configuration in a local config file. The location is show
146146
- **Grok (xAI)**: [console.x.ai](https://console.x.ai)
147147
- **OpenRouter**: [openrouter.ai](https://openrouter.ai/settings/keys)
148148

149-
## 🎯 Usage Examples
149+
## Usage Examples
150150

151151
### Basic Security Scan
152152
```bash
@@ -189,38 +189,38 @@ secureflow scan \
189189
--output weekly-findings.json
190190
```
191191

192-
## 🏗️ How It Works
192+
## How It Works
193193

194-
SecureFlow CLI uses an innovative **LLM File Request System** that works like tool calling:
194+
SecureFlow CLI uses an LLM file request system that works like tool calling:
195195

196196
1. **Project Discovery** - Analyzes project structure and identifies key files
197197
2. **Iterative Analysis** - AI makes targeted file requests using XML-like syntax:
198198
```xml
199199
<file_request path="./src/auth.js" reason="Analyze authentication logic" />
200200
<list_file_request path="./src/components" reason="Explore component structure" />
201201
```
202-
3. **Security Analysis** - Performs up to 3 iterations of analysis with context building
203-
4. **Report Generation** - Outputs comprehensive security findings with severity levels
202+
3. **Security Analysis** - Runs up to 3 iterations of analysis with context building
203+
4. **Report Generation** - Outputs security findings with severity levels
204204

205205
**Security Features:**
206-
- Hidden file filtering (ignores `.git`, `.DS_Store`, etc.)
207-
- Symlink protection against directory traversal
208-
- Project scope validation
209-
- File size limits (large files truncated)
210-
- ✅ Comprehensive request logging
206+
- Hidden file filtering (ignores `.git`, `.DS_Store`, etc.)
207+
- Symlink protection against directory traversal
208+
- Project scope validation
209+
- File size limits (large files truncated)
210+
- Request logging
211211

212-
## 🎨 Output Formats
212+
## Output Formats
213213

214214
### Text Format (Default)
215-
Beautiful colored terminal output with:
216-
- 🔴 Critical vulnerabilities
217-
- 🟠 High severity issues
218-
- 🟡 Medium severity warnings
219-
- 🔵 Low severity notes
220-
- ℹ️ Informational findings
215+
Colored terminal output with severity indicators:
216+
- Critical vulnerabilities
217+
- High severity issues
218+
- Medium severity warnings
219+
- Low severity notes
220+
- Informational findings
221221

222222
### JSON Format
223-
Structured output perfect for CI/CD integration:
223+
Structured output for CI/CD integration:
224224
```json
225225
{
226226
"summary": {
@@ -243,6 +243,6 @@ Direct integration with DefectDojo security platforms:
243243

244244
---
245245

246-
**Need Help?**
246+
**Need Help?**
247247
- Run `secureflow --help` for command overview
248248
- Open an issue or discussion on [GitHub](https://github.com/shivasurya/code-pathfinder/issues)

0 commit comments

Comments
 (0)