Loading workspace data...
We use essential cookies for authentication, workspace context, and security operations. Optional analytics cookies help improve product performance and UX.
New account creation is temporarily paused while we finalize release access. Join the waitlist to be notified when onboarding is opened.
Workspace
A transparent view of how scans run, how findings are normalized, and how evidence is produced.
Zero Branch is built for teams that need repeatable security workflows, clear ownership signals, and trustworthy outputs. This page summarizes scan workflow and scanner coverage at a practical level.
Dependency intelligence
Dependency intelligence and software inventory analysis
Dependency and package risk analysis with vulnerability correlation.
Infrastructure as code
Infrastructure policy and configuration analysis
IaC and configuration misconfiguration detection.
Secrets and credentials
Current and historical secret detection
Token/secret leak detection in repository content (and optional history paths).
CI/CD workflow hardening
Workflow security analysis
GitHub Actions and workflow risk analysis.
Advisory enrichment
External vulnerability intelligence feeds
Additional vulnerability context and normalization signals.
Feature access and throughput vary by plan. See pricing for current limits.
Findings are decision-support outputs and should be validated within your own threat model.
Third-party scanner and vulnerability-data notices are centralized on the public attribution page.
View data attribution →