Overview
VulnZap’s Faraday engine represents a paradigm shift from rule-based scanning to intelligent, context-aware security analysis. Instead of rigid AST traversal, Faraday deploys specialized AI agents that collaborate like a human security team.Faraday: Multi-Agent Architecture
Faraday coordinates a team of specialized agents, each with distinct expertise:1
Vulnerability Scanner Agent
Deep code analysis across multiple layers
- Intra-file analysis: Single-file vulnerability detection
- Inter-file analysis: Cross-file data flow tracking
- Architectural analysis: System-wide security patterns
- Hybrid approach: Traditional taint analysis + AI semantic reasoning
2
Context Validator Agent
The game-changer—eliminates false positives
- Uses file system tools (grep, readFile, find) to cross-reference findings
- Verifies vulnerabilities against actual code evidence
- Understands sanitization, validation, and protection layers
- Eliminates 90%+ of false positives through real-world context understanding
3
Scoring Agent
Risk assessment and prioritization
- Assigns CVSS scores based on real exploitability
- Calculates attack vectors and complexity
- Considers authentication requirements
- Evaluates business impact context
4
Remediation Agent
Automated vulnerability fixing
- Generates production-ready patches with precise line boundaries
- Understands code style and project conventions
- Creates minimal, surgical fixes
- Provides detailed fix explanations
All agents coordinate through Redis-backed memory, enabling parallel processing and intelligent task delegation.
MCP Tools for AI Agents
VulnZap provides 7 MCP tools that enable AI agents to perform vulnerability scanning during development:1. vulnzap.scan_diff
Fast, incremental, non-blocking scan on git diff:scan_idfor polling- ETA and file count
- Runs in background
2. vulnzap.status
Poll for scan results:ready: truewhen complete- List of vulnerabilities found
- Severity counts
3. vulnzap.full_scan
Baseline scan for entire repository:Use: Before serious push or deploy
4. vulnzap.report
Human-readable markdown report:5. vulnzap.security_assistant
Start file watcher for incremental security analysis:6. vulnzap.security_assistant_results
Retrieve results from active security assistant session:7. vulnzap.security_assistant_stop
Terminate security assistant session:Agent Workflow
Recommended workflow for AI coding agents:1
Startup Check
Call
vulnzap.status({ latest: true }) to check for existing issues2
While Coding
At checkpoints, call
vulnzap.scan_diff and continue coding3
Poll Status
Periodically call
vulnzap.status with scan_id4
Fix Issues
If issues found, fix them and call
vulnzap.scan_diff again5
Before Push
Call
vulnzap.full_scan once, poll until complete6
Generate Report
Call
vulnzap.report to attach to PRsScans are non-blocking. Agents can continue coding while scans run in the background.
How Faraday Works
Each agent leverages advanced language models to:- Understand code intent beyond syntax
- Reason about business logic and security implications
- Detect novel patterns that rule-based scanners miss
- Provide context-aware recommendations
Multi-Layer Analysis
Example: SQL Injection Detection- Detects SQL injection pattern
- Identifies source:
req.params.id(user-controlled) - Identifies sink:
db.execute()(SQL execution)
- Uses
grepto find input validation - Checks for ORM usage
- Verifies if parameterization exists elsewhere
- Confirms: Real vulnerability (no protections found)
- User-reachable: Yes
- Authentication required: No
- Impact: High (data exfiltration)
- Score: CRITICAL
- Generates fix:
Multi-File Vulnerability Detection
Faraday traces data flow across file boundaries:Exploitability Ranking
Not all vulnerabilities are equal. VulnZap ranks by real-world risk:Critical (9.0-10.0)
- User-controlled input reaches dangerous sink
- No existing mitigations
- High impact (RCE, data exfiltration)
- Publicly accessible code path
High (7.0-8.9)
- Partial user control or mitigations
- Significant impact
- Reachable from authenticated paths
Medium (4.0-6.9)
- Limited user control
- Moderate impact
- Some mitigations in place
Low (0.1-3.9)
- Minimal user control
- Low impact
- Multiple mitigations
- Theoretical exploitation
Patch Generation
VulnZap generates context-aware patches that preserve your code style:Style Preservation
Original:Framework-Aware Fixes
Different frameworks require different approaches:- Express.js
- Django
- Flask
Test Compatibility
VulnZap ensures patches don’t break existing tests:Performance & Results
Scan Performance
| Metric | Faraday | Traditional Scanners |
|---|---|---|
| Full repo scan | 5-7 minutes avg | 30-120 minutes |
| False positive rate | <5% | 20-40% |
| Novel pattern detection | ✅ Yes | ❌ No |
| Automated remediation | ✅ Working patches | ⚠️ Suggestions only |
| Multi-file analysis | ✅ Complete flow | ⚠️ Limited |
Real-World Impact
Traditional Scanner:Faraday’s Context Validator Agent eliminates 90%+ of false positives by verifying findings against actual code evidence.
Privacy & Security
Zero Data Retention
By default, VulnZap never stores your source code:- Code is analyzed in-memory
- Only metadata is stored (file paths, line numbers, vulnerability types)
- Analysis artifacts are immediately discarded
- Optional: Enable code snippets for dashboard context
Deployment Options
Cloud
Fully managed, no infrastructure required
VPC
Deploy in your own AWS/GCP/Azure VPC
On-Premises
Complete air-gapped deployment