Prove the bug.
Ship the fix.
AI security auditing that finds real bugs, proves they break, and gives your team patches worth merging. SAST, DAST, IaC, SCA — one system.
Found real vulnerabilities in




How it works
From signal to fix.
Scan
Your codebase, read as a system.
Winfunc doesn't grep for patterns. It reads code paths, follows data from entry point to sink, understands the business logic around it. Most scanner noise gets cut before you ever see it.
Prove
Every bug comes with its exploit.
You get the attack path, a working PoC, and the reasoning behind the severity call. No guessing whether something's real. If it can't be proven, it doesn't get reported.
Fix
Patches that follow the code.
Fix guidance is tied to the exact code path that broke. Not generic advice, not a CWE link and a shrug. Something your team can review and merge.
What you get
The proof.
→ Attacker-controlled URL passed directly to fetch(). Internal services, cloud metadata endpoints, and localhost are all reachable.

PoC
End the severity argument.
The report includes the exploit path, the blast radius, the reproduction steps. Engineering, security, and leadership see the same thing. Nobody has to take anybody's word for it.

Data flow
Trace the bug through the system.
Follow tainted input from entry to sink with the surrounding business logic intact. This is where the expensive bugs tend to hide, in the logic between the lines.

Patches
From finding to fix, fast.
Patch guidance respects the code around the bug. Teams spend less time translating abstract advice into something safe to ship.
Public archive
Real bugs. Published.
Teams using winfunc


“There were vulnerabilities we thought we'd taken care of. Winfunc found extremely complex bypasses around them. And the PoC and replication instructions made it simple to confirm the bug, fix it, and verify the fix. Other security tools never would have caught these.”
Research
From the lab.
FAQ
Common questions.
All of them. Winfunc uses tree-sitter, language servers, and LLM analysis to work across any stack. We've found bugs in Arc (a Lisp dialect). If your code compiles, we can read it.
Next
Start with the work.
Book a call, or read the public findings first. Either way, the proof is there.

