Backed byY

Prove the bug.
Ship the fix.

AI security auditing that finds real bugs, proves they break, and gives your team patches worth merging. SAST, DAST, IaC, SCA — one system.

View findings

Found real vulnerabilities in

Anthropic
Better Auth
Brave
Bun
Cal.com
Google
Gumroad
Hoppscotch
Kastle
Mattermost
Microsoft
The New York Times
NVIDIA
Sentry
Supabase
Anthropic
Better Auth
Brave
Bun
Cal.com
Google
Gumroad
Hoppscotch
Kastle
Mattermost
Microsoft
The New York Times
NVIDIA
Sentry
Supabase

How it works

From signal to fix.

01

Scan

Your codebase, read as a system.

Winfunc doesn't grep for patterns. It reads code paths, follows data from entry point to sink, understands the business logic around it. Most scanner noise gets cut before you ever see it.

02

Prove

Every bug comes with its exploit.

You get the attack path, a working PoC, and the reasoning behind the severity call. No guessing whether something's real. If it can't be proven, it doesn't get reported.

03

Fix

Patches that follow the code.

Fix guidance is tied to the exact code path that broke. Not generic advice, not a CWE link and a shrug. Something your team can review and merge.

-
+

What you get

The proof.

services/webhook/handler.tsSSRF
14async function handleWebhook(req: Request) {
15 const url = req.headers.get('x-callback-url');
16 
17 // No validation — attacker-controlled URL
18 const response = await fetch(url);
19 
20 const data = await response.json();
21 await db.webhookLogs.create({ data });
22 return Response.json({ ok: true });
23}

Attacker-controlled URL passed directly to fetch(). Internal services, cloud metadata endpoints, and localhost are all reachable.

End the severity argument.

PoC

End the severity argument.

The report includes the exploit path, the blast radius, the reproduction steps. Engineering, security, and leadership see the same thing. Nobody has to take anybody's word for it.

Trace the bug through the system.

Data flow

Trace the bug through the system.

Follow tainted input from entry to sink with the surrounding business logic intact. This is where the expensive bugs tend to hide, in the logic between the lines.

From finding to fix, fast.

Patches

From finding to fix, fast.

Patch guidance respects the code around the bug. Teams spend less time translating abstract advice into something safe to ship.

Public archive

Real bugs. Published.

3 Critical
2 High
3 Medium

Teams using winfunc

Noah, Co-Founder & CEO, Scout (YC W25)
Company logo
There were vulnerabilities we thought we'd taken care of. Winfunc found extremely complex bypasses around them. And the PoC and replication instructions made it simple to confirm the bug, fix it, and verify the fix. Other security tools never would have caught these.
Noah
Co-Founder & CEO, Scout (YC W25)

Research

From the lab.

FAQ

Common questions.

All of them. Winfunc uses tree-sitter, language servers, and LLM analysis to work across any stack. We've found bugs in Arc (a Lisp dialect). If your code compiles, we can read it.

Next

Start with the work.

Book a call, or read the public findings first. Either way, the proof is there.

View findings