Add VulnHawk - AI-powered SAST scanner#122
Add VulnHawk - AI-powered SAST scanner#122momenbasel wants to merge 1 commit intodevsecops:masterfrom
Conversation
Add VulnHawk to the Testing section. It's an AI-powered static analysis tool that fills the gap between pattern-matching SAST and manual code review via context-enriched analysis.
There was a problem hiding this comment.
Pull request overview
Adds VulnHawk to the repository’s tool list to include an AI-assisted static analysis/SAST-style scanner within the “Testing” tools section.
Changes:
- Add a new README entry for VulnHawk under ## Testing
💡 Add Copilot custom instructions for smarter, more guided reviews. Learn how to get started.
| * [ShiftLeft Scan](https://slscan.io) | ||
| * [Snyk](https://snyk.io) | ||
| * [SourceClear](https://www.sourceclear.com) | ||
| * [VulnHawk](https://github.com/momenbasel/vulnhawk) - AI-powered static analysis tool with context-enriched code review. Supports Python, JS/TS, Go, Java, PHP, Ruby. GitHub Action + CLI with SARIF input/output. |
There was a problem hiding this comment.
This is the only entry in the Testing list that adds a long, multi-sentence description after the link (via - ...). To keep the list consistent and scannable, consider limiting this to the same pattern as the surrounding items (link-only, or at most a very short phrase).
| * [ShiftLeft Scan](https://slscan.io) | ||
| * [Snyk](https://snyk.io) | ||
| * [SourceClear](https://www.sourceclear.com) | ||
| * [VulnHawk](https://github.com/momenbasel/vulnhawk) - AI-powered static analysis tool with context-enriched code review. Supports Python, JS/TS, Go, Java, PHP, Ruby. GitHub Action + CLI with SARIF input/output. |
There was a problem hiding this comment.
PR description says this is added to the "SAST section", but the README doesn’t have a SAST section heading and this change lands under "## Testing". Please align the PR description with the actual placement (or move the entry if a different section was intended).
Hey, adding VulnHawk to the SAST section. It's an AI-powered static analysis tool that fills the gap between pattern-matching SAST (Semgrep/CodeQL) and manual code review.
The key feature is context enrichment - for each code chunk analyzed, it includes related code from elsewhere in the codebase (auth patterns, validation logic from similar endpoints). This lets the AI spot the one endpoint that skips authorization when all similar ones enforce it.
https://github.com/momenbasel/vulnhawk