Skip to content

Automatic translation from Russian to English. It may contain inaccuracies.

Posts

A couple of days ago I came across an article with a great title: “DevSecOps for 20 milli…

October 21, 2025 at 8:13 PMMax Knyazev is typing…Telegram mirror
Post image 1
A couple of days ago I came across an article with a great title:“DevSecOps for 20 million? I made my own scanner and posted it for free". The author is a former security professional who decided to build his own vulnerability scanner and release it to the public. Sounds nice. A free analogue of expensive commercial solutions, with support for SAST, SCA and IaC. Just upload the file, press the button and get a report. Minimalistic interface, no registration, no SMS, no purchases or paperwork. In theory, this is an ideal story for anyone who is tired of tenders and bureaucracy🤩

But you know me - your hands were itching to check it out yourself😉

I took several of my test projects, and then specially using GPT-5 to generate a demo project with obvious vulnerabilities, so that I would have exactly what to look for. I ran it through the scanner from the article (Bylinkyou can check it out for yourself), and then throughSemgrep- and then things got interesting. Semgrep found 25 vulnerabilities, of which five were critical. But the hero of today’s post, SecCoder, didn’t find anything at all. Judging by the output, it uses Trivy and Dependency-Check, which in my case just silently passed by. Perhaps a bug, perhaps a mismatch of formats, but so far the result looks, to put it mildly, unstable. It’s especially strange that you can scan only one file at a time, and not the entire project🧐

I ran other projects for scanning, and SecCoder either found something or was silent again. I can’t draw any conclusions here from the “why is this happening?” I still don't know the answer😏

What the author writes about the difficulty of setting up tools like Semgrep or Trivy is a half-truth. Both are placed in a pair of teams and work without dancing with a tambourine. Yes, commercial solutions like PT AI really cost a fortune (and it’s really more difficult to turn around), but there are many free open source alternatives that are quite accurate and convenient for real work. Therefore, the “but it’s free” argument doesn’t help here - it’s more important that the tool be reliable🧠

However, I don't want to sound too critical. The very fact that a person took and made his own scanner, even in the form of a beta that does not always work, is already cool (at least it's cool). Here you feel the motivation not to whine, but to try to make it simpler and clearer. The interface turned out to be neat, easy and pleasant - the author definitely likes it. I think if we add support for scanning repositories, normalize the output and improve the tool as a whole, something more interesting might turn out. Although the question of value remains open🥳

But for now it’s more of a cool pet project than a working tool for production security. Look at it - yes, use it on real projects - not yet. My test results (comparison with Semgrep) I attached in the comments under the post🥂

#information_security
Open original post on Telegram

Connection graph

How this work connects to others

No explicit connections have been configured for this work yet. You can still open the full graph or the timeline of all works.

Hover over a line to see what connects one work to another.

Use the mouse wheel to zoom the graph and drag it like a map.

Post
100%

Discussion

Comments

Comments are available only to confirmed email subscribers. No separate registration or password is required: a magic link opens a comment session.

Join the discussion

Enter the same email that you already used for your site subscription. We will send you a magic link to open comments on this device.

There are no approved comments here yet.