Pre-execution governance for AI-assisted development.
Block risky actions
before they run — across IDE, CI, and agents.
$ pip install codetrust
copied
Every scan, every block, every verification — streamed live from production.
connecting…
SonarQube has 5,000 rules. Snyk knows every CVE. Semgrep does cross-file
dataflow.
CodeTrust does all of that — plus three capabilities none of them have.
Pre-execution interception of AI agent commands. Validates every terminal command, file write, and package install against configurable policies — before it runs.
Extracts imports from source files and verifies every package against live PyPI and npm registries. Catches packages that don't exist — with exact file and line number.
Not a snapshot — a real metric that tracks code safety over time. Baseline trending, delta tracking, and grade curves answer: is your code getting safer or more dangerous?
Other tools scan your code after it's
written.
CodeTrust's Gateway sits between the AI model and your system,
intercepting destructive
commands in real-time.
During v2.1.0 development, our own AI agent attempted a heredoc command.
The gateway blocked it. The product protected itself from its own builder.
CodeTrust intercepts at every stage. Nothing reaches production unchecked.
CLI · VS Code · GitHub Action · MCP Server · Cloud API — same enforcement, every surface
Every scan produces a Trust Score. Hallucination findings are penalized heavily. The baseline persists between runs. Delta tracking shows improvement or regression.
Your AI agent suggests a package import — it looks right, it compiles.
But the package doesn't exist. It was hallucinated. Your production build
installs a typosquatted backdoor instead.
Every linter checks syntax. Nobody enforces governance on AI agents.
AI agents run rm -rf, dynamic code execution, curl | sh autonomously — data loss, RCE, supply chain compromise
AI invents package names that don't exist on PyPI, npm, or crates.io — typosquatted malware installs silently
Base images with non-existent tags — build fails at 2AM on deploy night
AI code quality degrades gradually. No one measures it. Technical debt accumulates without signal
Gateway blocks before execution. Import verification catches before install. Drift score tracks continuously
Hallucinated package caught. Anti-patterns flagged. Trust score calculated. All in one command.
Code enters at Layer 1. If it survives all 10, it ships. If not — you know exactly why.
15 core rules — secrets, eval/exec, injection, heredocs, debug statements
4 rules — swallowed exceptions, lint suppression, defensive null-coalescing
13 rules — SELECT *, DELETE without WHERE, FLOAT for money, GRANT ALL
Tree-sitter structural parsing — complexity, unused variables, unreachable code
10 rules — root user, :latest tags, missing WORKDIR, ENV secrets, no healthcheck
7 rules — hardcoded IPs, debug mode, API keys in config, unbounded retries
13 rules — dangerouslySetInnerHTML, privileged pods, missing resource limits
Live PyPI/npm check — catches hallucinated packages automatically
Validates base images and tags exist on Docker Hub and GHCR before build
72 real-time interception rules — blocks destructive AI agent actions before execution
Five enterprise capabilities that match billion-dollar competitors.All included. No upsell.
Checks every dependency against the OSV database. Returns CVE IDs, severity scores, affected versions, and recommended fixes.
POST /v1/vuln/scan
Extracts licenses from PyPI and npm. Flags copyleft (GPL, AGPL) vs. permissive (MIT, Apache). Policy-driven allow/deny lists.
POST /v1/license/scan
Builds the full import graph. Detects circular dependencies, orphan modules, and hub files. Identifies architectural risks before they ship.
POST /v1/scan/cross-file
Generates fixes for findings and opens pull requests via GitHub API. One command to go from finding to fix.
codetrust fix --pr
Organization-level policies, role-based access control, team member management, and policy inheritance across repos.
10 endpoints under /v1/orgs/*
82 scan rules + 72 gateway rules. BLOCK stops the pipeline — WARN flags risk — INFO improves
154 rules. Scan on save. Works offline.
ext install SaidBorna.codetrust
View on Marketplace →
154 rules. 10 enforcement layers. 42 API endpoints.
Five enterprise services.