Find vulnerabilities
before they ship.
3-phase scanning engine: fast static analysis, AI-augmented triage, and compliance enrichment. 25 CWE detectors. Full OWASP Top 10 coverage. Supply chain analysis. All running locally in your IDE — no code leaves your machine.
Scanner Capability Report
Deva IDE — 3-Phase Security Analysis Engine
DOC-SEC-2026-0013-Phase Scanning Pipeline
Not just regex. Not just an LLM wrapper. Deva combines deterministic analysis with AI-powered triage to minimize false positives without missing real bugs.
Phase 1
Fast Scan
Hybrid regex + tree-sitter AST + taint tracking. 25 CWE detectors, 32 pattern rules. Under 2 seconds.
Phase 2
LLM-Augmented Analysis
AI post-processor confirms or rejects findings and discovers blind spots. Reduces false positives.
Phase 3
Merge & Enrich
Deduplicate by file, line, and CWE. Map to compliance frameworks. Supply chain enrichment.
CWE Detector Coverage
6 hybrid detectors use tree-sitter AST parsing and taint tracking for deep analysis. 19 pattern-based detectors catch common vulnerability signatures.
OWASP Top 10 Coverage
CWE-22, CWE-306, CWE-352, CWE-601
CWE-295, CWE-327, CWE-330, CWE-338
CWE-20, CWE-78, CWE-79, CWE-89, CWE-94
CWE-400, CWE-502
CWE-611, CWE-614, CWE-676
SCA supply chain scanner
CWE-259, CWE-798, CWE-306
CWE-502, CWE-434
CWE-200, audit logging checks
CWE-918
AI-Assisted Remediation
Every finding comes with an AI-generated fix that understands your code context. One-click apply. Diff preview. The fix respects your code style, imports, and framework patterns.
// Before: CWE-89 SQL Injection
db.query(f"SELECT * FROM users WHERE id = {user_id}")
// After: Parameterized query
db.query("SELECT * FROM users WHERE id = %s", (user_id,))
Software Composition Analysis
2,800+ packages
Known-vulnerable package metadata catalog
Dependency graph
Visual dependency tree with transitive risk propagation
27,000+ CVEs
CVE records with fix versions and severity scoring
License detection
Identifies copyleft, restrictive, and unknown licenses
Language Support — 22 Languages
14 Compliance Frameworks
Every finding is automatically mapped to all applicable compliance controls. Export audit-ready evidence in SARIF, OSCAL, JUnit, CSV, JSON, or Agent JSON.
OWASP Top 10
2021
HIPAA
Security Rule
CMMC 2.0
Level 1-3
NIST 800-171
r2 + r3
NIST 800-53
Rev 5
NIST CSF 2.0
All functions
FedRAMP
Low/Mod/High
PCI DSS
v4.0
SOC 2
Type II
SOX ITGC
IT controls
ISO 27001
2022
CWE Top 25
2024
GDPR
Art 25 & 32
CISA BOD
Secure by Design
Local-First Architecture
Zero egress
No source code, findings, or telemetry ever leave your machine
Open source engine
OpenClaw scanner — inspect every detection rule yourself
6 export formats
SARIF, OSCAL, JUnit, CSV, JSON, Agent JSON
Ship secure code. Every commit.
Deva finds vulnerabilities while you write code — not after a breach. Free, open-source, and local-first.