
Codebase scans are in beta.
Issues that codebase scans find
Codebase scans focus on high-impact issues:- Secret scanning: hardcoded API keys, credentials, tokens, and other secrets that shouldn’t be in your codebase
- Vulnerability scanning: known CVEs in your dependencies, unsafe version ranges, and security advisories
- Infrastructure-as-Code scanning: security misconfigurations in Terraform, Kubernetes manifests, Dockerfiles, and CloudFormation templates, like public S3 buckets, open security groups, unencrypted databases, and privileged containers
- Security vulnerabilities: authentication bypasses, injection points, insecure configurations
- Data integrity risks: race conditions that corrupt state, missing validations, unsafe database operations
- Business logic flaws: billing edge cases that lose money, incorrect permission checks, broken invariants
How it works
cubic clones your repository into an isolated sandbox and deploys thousands of agents that explore your codebase in parallel. These agents:- Navigate across files to trace data flows
- Follow call chains to verify issues
- Check external documentation (framework docs, security advisories)
- Access up-to-date documentation for the libraries and frameworks in your stack
- Apply learnings from PR reviews—feedback from your team, senior reviewers, and prior corrections—so scans reflect your codebase’s standards
- Test multiple hypotheses before confirming findings
- Use your repository’s AI Wiki to understand product context and prioritize investigations
- Maps your repository structure
- Checks for an up-to-date AI Wiki—if one doesn’t exist, cubic generates it automatically
- Deploys thousands of parallel agents informed by the wiki’s understanding of your product
- Investigates suspicious patterns
- Deduplicates findings
- Scores by severity and confidence
Why findings are actionable
Traditional security scanners are notorious for false positives. Teams report that up to 90% of findings from rule-based tools turn out to be non-issues when investigated in context. cubic takes a different approach. Instead of pattern-matching and dumping results, AI agents investigate each potential issue:- Contextual analysis: Agents assess whether a vulnerability is actually exploitable in your specific codebase
- Cross-reference verification: Findings are validated against actual code paths, not just syntactic patterns
- Severity scoring: Only issues that pass investigation are reported, with confidence scores based on evidence
Starting a scan
Codebase scans are available by request. Once enabled:- Navigate to your repository’s Codebase scan page
- Click Start scan
- Continue working. You’ll be notified when results arrive
Working with results
Every finding appears in a sortable, filterable table:
- Issue: summary of what’s wrong, plus file path and line number
- Category: Security, Business logic, Data integrity, or Stability
- Owner: who’s responsible for the code (from CODEOWNERS file, or git blame if no CODEOWNERS)
- Fix effort: estimated difficulty to fix (1-10)
- Status: Open, Resolved, or Dismissed
- Severity: how critical the issue is (1-10)
Owner attribution
cubic automatically identifies who’s responsible for each finding using your repository’s CODEOWNERS file. This lets you route issues to the right team—whether that’s@frontend-team, @security, or a specific engineer.
If your repository has a CODEOWNERS file (in the root, .github/, or docs/ directory), cubic uses it to determine ownership. If no CODEOWNERS match exists, cubic falls back to git blame to show who last modified the code.
This is especially useful for large codebases where different teams own different parts of the code. Filter by owner to see only your team’s issues, or export filtered results to share with specific teams.
Click any issue for:
- Full explanation with code context
- AI sidebar to explore the finding interactively
- Copy prompt button for a ready-to-paste fix prompt
- Create Jira/Linear tickets to track remediation work
- Fix with Cursor to open a prefilled prompt in Cursor

One-click fix
cubic makes it easy to fix issues directly—no need to context-switch to your IDE or dig through files. Just select the issues you want fixed and let cubic handle it. The fastest way: use multi-select to fix many issues at once.- Use the checkboxes to select issues in the results table
- Click Fix with cubic in the bulk actions bar
- cubic spins up background agents that investigate each issue, then create PRs with fixes
Create Jira or Linear tickets
If your repo is connected to Jira or Linear, you can create tickets directly from a finding.Fix with Cursor
From the violation actions menu, choose Fix with Cursor to open Cursor with a prefilled prompt containing the issue summary, analysis, and relevant code context.When to run scans
Scan frequency depends on your security requirements: Daily scans (recommended for teams with strict SLAs):- Critical vulnerability SLAs under 48 hours require daily dependency scanning
- Ensures new CVEs are caught within your response window
- Good balance of coverage and cost for most teams
- Catches issues before they accumulate
- Before major releases
- After architecture changes
- Post-dependency updates
Custom instructions
Guide what cubic focuses on during scans. Custom instructions let you define security invariants—baseline policies that should always hold true in your codebase. Security & compliance examples:- “All traffic must be encrypted—flag any HTTP endpoints without TLS”
- “Storage in infrastructure-as-code must have encryption enabled”
- “All user input must pass through our
sanitize()function before database queries” - “Authentication tokens must never be logged or exposed in error messages”
- “Focus on authentication flows and payment processing”
- “We use a custom ORM that wraps Prisma—account for this in SQL injection checks”
- “Our
validatePermissions()helper is the authoritative access control check”
- Go to your repository’s Codebase scan page
- Click the schedule dropdown → Custom instructions
- Enter your instructions (up to 10,000 characters)
- Save
FAQ
How is cubic different from traditional SAST tools like Aikido, Snyk, or SonarQube?
How is cubic different from traditional SAST tools like Aikido, Snyk, or SonarQube?
Traditional SAST tools use pattern-matching rules that generate massive false positive rates—teams report up to 90% of findings are non-issues. cubic is fundamentally different in two ways:1. Exploitability analysis: Instead of just flagging patterns, AI agents trace code paths to verify whether each finding is actually reachable and exploitable. Dependency vulnerabilities are only reported when the vulnerable code path is called. CVEs are assessed for real-world impact, not just version matching.2. Business logic bugs: SAST tools can only find what rules exist for—SQL injection, XSS, etc. cubic finds issues that pattern-matching fundamentally cannot detect: billing edge cases that lose money, broken permission checks, race conditions, incorrect state transitions, and other logic flaws specific to your codebase.
Will this slow down our PR reviews?
Will this slow down our PR reviews?
No. PR reviews remain fast and inline. Scans run completely separately in the background.
How accurate are the findings?
How accurate are the findings?
Very high signal-to-noise ratio. Unlike traditional scanners that flood you with false
positives, every finding is validated by AI agents before being reported. Teams report
immediately actionable results without the triage burden.
What's the actual runtime?
What's the actual runtime?
Small repos: 2-6 hours. Medium: 6-12 hours. Large enterprise codebases: 24-48 hours. You get
progress updates throughout.
Can this replace our SAST/SCA tools?
Can this replace our SAST/SCA tools?
For many teams, yes. cubic covers static code analysis (SQL injection, XSS, auth bypasses), dependency vulnerability scanning with exploitability analysis, secret detection, and infrastructure-as-code scanning. The key advantage is that cubic validates whether vulnerabilities are actually reachable and exploitable—not just pattern-matching on version numbers. Teams using traditional scanners often report 90%+ false positive rates; cubic’s validation approach eliminates that triage burden. You may still want specialized tools for dynamic scanning, malware detection in dependencies, or SBOM generation.
How does pricing work?
How does pricing work?
Scans are included in your cubic subscription. No per-scan charges. Run as many as you need.