Semantic taint tracking
across your entire codebase.
Cognium builds data flow graphs and tracks tainted input across functions, files, and frameworks. Full inter-procedural analysis, not regex pattern matching.
Traces data from source to sink.
Traditional SAST matches text patterns — grep "eval(" across your codebase. Cognium builds data flow graphs and tracks tainted input across function calls, collections, and conditionals.
If user input reaches a dangerous function without sanitization, that's a real finding — not a guess. Configure sources, sinks, and sanitizers in YAML. No query language to learn.
Five-stage deterministic analysis.
Each scan builds a complete data flow graph from sources to sinks.
Numbers you can reproduce.
Every score below is from the open-source static engine. No LLM. Fully deterministic.
Static analysis: 42.5%
+ LLM enhancement: 78.3%
The open-source engine runs deterministically without any LLM. Optionally enable LLM-based discovery to increase detection rate from 42.5% to 78.3% on CWE-Bench.
Discovery Mode
LLM reads source code and locates vulnerable methods from scratch — no prior static signal required. Drives the 78.3% score.
Verification Mode
Confirms whether a static finding is actually exploitable. High-precision output for triage.
Semantic Extraction
Extracts design intent to Specifica format — automated gap analysis between spec and implementation.
$ export LLM_ENRICHMENT_MODEL=claude-opus
Plug in Claude, GPT-4, Gemini, DeepSeek, or any LLM you prefer — swap it with a single env var. No vendor lock-in. The static engine always runs independently. Contact us to discuss custom integrations and enterprise deployment.
6 languages. 19 CWE types.
Includes framework definitions for Spring, Express, Flask, Actix, and more. Sources, sinks, and sanitizers are pre-configured in YAML.
npm install. No registration.
GitHub Actions
- run: npm install -g cognium
- run: cognium scan ./src
--format sarif -o results.sarif
--severity high
Pre-commit Hook
# .git/hooks/pre-commit
if ! cognium scan . --severity critical -q; then
echo "Blocked: critical vulns found"
exit 1
fi
Open source security tooling.
Cognium is MIT licensed and built in the open. Contribute framework configs, bug reports, integrations, or custom rules to improve detection for the entire community.
Add Framework Support
Request or contribute YAML configs for your framework — Rails, Gin, Axum, NestJS, or anything else. Each new framework config extends coverage for everyone.
Request a framework →Build Editor Integrations
Bring Cognium into VS Code, Neovim, JetBrains, Zed — or any editor with LSP or extension support. SARIF output makes this straightforward.
Discuss integrations →Plugin Into Your CI/CD
Build plugins for GitHub Actions, GitLab CI, Jenkins, Bitbucket Pipelines, or your custom verification pipeline. SARIF is the interchange format.
Integration docs →Write, Review, Report
Write a blog post about your findings. Create a pull request. File a bug. Every contribution helps the engine improve and the community grow.
Contribute on GitHub →