Skip to main content

Autonomous AI security agent for your codebase

Project description

DevGuard

Autonomous AI security agent for your codebase. Runs offensive and defensive analysis — SAST, secrets detection, dependency audit, dynamic testing, auth review — and delivers a structured report with findings, CVSS scores, and ready-to-apply remediations.

Install

pip install cleanpredict-devguard

For GCP Vertex AI support:

pip install cleanpredict-devguard[vertex]

Configuration

DevGuard needs two things: a license key and an LLM provider key.

1. License key

export DEVGUARD_API_KEY=sk-grd-...    # get yours at https://guardion.ai

2. LLM provider (choose one)

DevGuard auto-selects the best available model per provider and falls back to cheaper alternatives if unavailable.

Anthropic (recommended)

export ANTHROPIC_API_KEY=sk-ant-...
# Models: claude-sonnet-4 -> claude-3.5-sonnet -> claude-3-haiku

OpenAI

export OPENAI_API_KEY=sk-...
# Models: gpt-4.1 -> gpt-4o -> gpt-4o-mini

Azure OpenAI

export AZURE_OPENAI_API_KEY=your-key
export AZURE_OPENAI_ENDPOINT=https://your-resource.openai.azure.com
# Optional:
export AZURE_OPENAI_DEPLOYMENT=gpt-4o     # your deployment name
export AZURE_OPENAI_API_VERSION=2023-05-15
# Models: gpt-4.1 -> gpt-4o -> gpt-4o-mini (or your deployment)

GCP Vertex AI

export GOOGLE_APPLICATION_CREDENTIALS=/path/to/service-account.json
export VERTEX_PROJECT=my-gcp-project
# Optional:
export VERTEX_LOCATION=us-central1
export VERTEX_MODEL=gemini-2.5-pro
# Models: gemini-2.5-pro -> gemini-2.5-flash -> gemini-2.0-flash

Groq (cheapest)

export GROQ_API_KEY=gsk_...
# Models: llama-3.1-70b -> llama-3.1-8b

Usage

devguard security ./my-project          # full security analysis
devguard security .                     # current directory
devguard security . --model gpt-4o     # force specific model
devguard security . --no-save           # don't save report file
devguard history ./my-project           # view analysis history
devguard version

What it does

DevGuard runs 5 phases autonomously:

Phase What runs Tools used
1. Recon Detect stack, deps, configs, secrets, git history list_dir, read_file, find, git log
2. SAST Static analysis, secrets scan, dependency audit gitleaks, semgrep, pip-audit, npm audit, trivy
3. Dynamic Port scan, header analysis, vuln scanning nmap, OWASP ZAP, nuclei, http requests
4. Auth JWT, cookies, OAuth, RBAC review Code reading + analysis
5. Report Structured markdown with CVSS, CWE, remediations write_file

Tools are auto-detected. If not installed locally, DevGuard tries Docker. If neither is available, it documents the skipped check.

Output

Generates devguard-report.md in the project root:

# DevGuard Security Report
**Project:** my-app | **Date:** 2025-05-18 | **Stack:** Python + Docker

## Executive summary
The project has 2 critical and 3 medium vulnerabilities...

## Critical findings — CVSS >= 7.0
### [CRITICAL] SQL Injection in /api/users
**CVSS:** 9.8 | **CWE:** CWE-89 | **Tool:** semgrep
**Location:** src/routes/users.py:42
**Remediation:** <ready-to-copy fix>

## Medium findings — CVSS 4.0-6.9
...

Memory between runs

DevGuard remembers findings across analyses. On the second run:

  • Shows what was fixed since last analysis
  • Shows what's still open (and for how many days)
  • Highlights new findings

History is stored in .devguard/devguard.db (add .devguard/ to your .gitignore).

Model fallback

If the best model isn't available on your account, DevGuard automatically tries the next one:

anthropic:  claude-sonnet-4 → claude-3.5-sonnet → claude-3-haiku
openai:     gpt-4.1 → gpt-4o → gpt-4o-mini
azure:      your-deployment → gpt-4.1 → gpt-4o → gpt-4o-mini
vertex:     gemini-2.5-pro → gemini-2.5-flash → gemini-2.0-flash
groq:       llama-3.1-70b → llama-3.1-8b

Override with --model:

devguard security . --model claude-3-haiku-20240307

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

cleanpredict_devguard-0.3.0.tar.gz (59.8 kB view details)

Uploaded Source

Built Distribution

If you're not sure about the file name format, learn more about wheel file names.

cleanpredict_devguard-0.3.0-py3-none-any.whl (18.5 kB view details)

Uploaded Python 3

File details

Details for the file cleanpredict_devguard-0.3.0.tar.gz.

File metadata

  • Download URL: cleanpredict_devguard-0.3.0.tar.gz
  • Upload date:
  • Size: 59.8 kB
  • Tags: Source
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/6.2.0 CPython/3.13.2

File hashes

Hashes for cleanpredict_devguard-0.3.0.tar.gz
Algorithm Hash digest
SHA256 6598bb9dcd9aa9dde8082b0f363e0dce9b433f775b31f6fd7803b1bf91a55e2b
MD5 ecd9ca0f159efe43d35dad7036ffa47b
BLAKE2b-256 d2ccf32ada81c4236ef6806ce21f5366abf22bfa2a88b7e69ac751dd65bde0d7

See more details on using hashes here.

File details

Details for the file cleanpredict_devguard-0.3.0-py3-none-any.whl.

File metadata

File hashes

Hashes for cleanpredict_devguard-0.3.0-py3-none-any.whl
Algorithm Hash digest
SHA256 85bca41cab9ccaf7fb2e23e98016ffa6b0856a230c5289968828ff9271f12dbc
MD5 8d12d45773e130957240cfa15b64c9c6
BLAKE2b-256 10e59d01bc1d90d7fa5461480192769a78703418217c17c40e3b0bad610f4ea0

See more details on using hashes here.

Supported by

AWS Cloud computing and Security Sponsor Datadog Monitoring Depot Continuous Integration Fastly CDN Google Download Analytics Pingdom Monitoring Sentry Error logging StatusPage Status page