CodeMarine Beta
Recruiting now
codemarine guardian --watch
$ codemarine guardian --watch src/
⚓ CodeMarine Guardian v2.1.0 | patterns: 2,847 | mode: real-time
watching src/ for changes...
14:23:07 SCAN src/api/auth.py (AI-generated, 47 lines)
14:23:07 VULN SQL injection line 23 | f-string in query()
14:23:07 WARN hardcoded secret line 8 | API key in source
14:23:07 SLOP hallucinated package line 2 | "flask-auth-utils" not on PyPI
14:23:07 DONE 3 findings in 12ms | your code never left this machine

Your AI writes the code.
Who's watching it?

AI generates code faster than any human can review. CodeMarine watches it for you. Catches vulnerabilities at file save, before they reach your repo. Local-only. Under 50ms. No cloud round-trip.

Free beta access. No credit card. Unsubscribe anytime.

100% local. Your code never leaves your machine Works with Cursor, Copilot, Windsurf & more

The Threat Is Already Here

AI coding tools ship production code at scale. The security tooling hasn't caught up.

45%
of AI-generated code contains security flaws
Veracode, 2025
30+
CVEs in AI coding IDEs. Cursor, Copilot, all of them
Pillar Security, Dec 2025
205K+
hallucinated package names weaponised by attackers
Trend Micro / Socket.dev
41%
of all code globally is now AI-written or AI-assisted
MIT Tech Review, Jan 2026

All sourced. Full analysis at codemarine.ai/research

What CodeMarine Does

Real-Time, At File Save

Scans every line as you write it. Under 50ms. No waiting for CI/CD, no alerts arriving weeks later to the wrong person.

100% Local. Zero Cloud

Your code never leaves your machine. All scanning happens locally. No cloud processing, no third-party access. Air-gapped teams welcome.

Built for the AI Era

Detects slopsquatting, rules file backdoors, prompt injection patterns and the vulnerability signatures AI assistants produce most often.

Sarge

Recruit Devs. Rank Up.

Every dev you refer moves you up the queue and unlocks rewards. You get a unique referral link when you enlist.

Your Rank
★★★ Sergeant
Recruits
14
031025100

11 more recruits to reach Captain

🪖
Private
0 referrals
Standard queue
🎖️
Corporal
3 referrals
Front 50% of queue
🔰
Sergeant
10 referrals
First-wave + 1yr Scout
⚔️
Captain
25 referrals
1yr Platoon for 6
🏛️
Colonel
100 referrals
Lifetime Platoon for 6

Enlist now to get your referral link

Frequently Asked Questions

What is CodeMarine?
CodeMarine is an AI code security tool that catches vulnerabilities in AI-generated code at file save. It runs 100% locally on your machine in under 50ms. It works with Cursor, GitHub Copilot, Windsurf, Claude Code and any other AI coding tool that writes files to disk. It detects SQL injection, hardcoded secrets, slopsquatting (hallucinated packages), rules file backdoors, JWT bypasses and more across 35+ languages. Your code never leaves your machine.
Is CodeMarine an AI tool?
No. CodeMarine does not use AI, LLMs or machine learning internally. It is a deterministic, pattern-based security scanner that uses over 22,000 cryptographically signed security patterns. Results are reproducible, predictable and not subject to hallucination. It is built for the AI era but is not itself an AI product.
Does my code leave my machine?
Never. CodeMarine runs 100% locally. Source code is never uploaded, transmitted or processed in the cloud. Pattern databases sync from CodeMarine servers but all scanning happens on your device. Suitable for air-gapped environments, classified projects, HIPAA and financial services.
How fast is it?
Guardian scans complete in under 50ms at file save. For comparison, cloud-based code review tools like CodeRabbit take 30-60 seconds per review. CI/CD scanning tools like Snyk report findings hours or days after commit. CodeMarine's speed comes from running locally with compiled pattern matching rather than LLM inference.
What does CodeMarine detect?
SQL injection via f-strings and string formatting. Command injection. Hardcoded secrets and API keys. Disabled TLS verification. Path traversal. Dangerous eval/exec usage. JWT verification bypasses. CORS misconfigurations. CSRF gaps. Authentication logic flaws. Slopsquatting (hallucinated package names). Rules file backdoors and prompt injection in .cursorrules, copilot-instructions.md and MCP configs. AI behavioural patterns specific to each coding assistant. Over 22,000 signed patterns across 35+ languages.
What is slopsquatting?
Slopsquatting is a supply chain attack that exploits AI hallucination. AI coding assistants sometimes suggest installing packages that do not exist in any registry. Attackers register these hallucinated names on npm, PyPI and other registries with malicious code. Over 205,000 hallucinated package names have been documented by Socket.dev and Trend Micro. CodeMarine detects slopsquatting by checking every package name against known-good registries before installation.
What are rules file attacks?
AI coding IDEs use configuration files like .cursorrules, copilot-instructions.md, CLAUDE.md and MCP server configs to control how the AI assistant behaves. Attackers can inject malicious instructions into these files through pull requests or shared repositories, causing the AI to generate vulnerable code, exfiltrate data through crafted URLs or disable security checks. CodeMarine scans these files for prompt injection, invisible Unicode manipulation, encoded payloads and shell injection patterns.
Which AI coding assistants does it work with?
GitHub Copilot, Cursor, Claude Code, Windsurf, Amazon Q Developer, Google Gemini Code Assist, Tabnine, JetBrains AI Assistant, Sourcegraph Cody, Continue.dev, Augment Code, Devin, Roo Code, Aider, Cline and others. CodeMarine monitors the filesystem directly, so any tool that writes code to disk is automatically covered without specific integration. New AI tools are covered the moment they ship.
How is this different from Snyk, Checkmarx or SonarQube?
Traditional SAST tools were built for human-written code. They scan at CI/CD time (too late), often in the cloud (code leaves your machine) and for traditional vulnerability patterns. They cannot detect AI-specific threats like slopsquatting, rules file backdoors or AI behavioural patterns. CodeMarine scans at file save (the earliest possible moment), runs 100% locally, and detects threats specific to AI-generated code. CodeMarine is complementary to these tools, not a replacement.
What languages are supported?
35+ languages including JavaScript, TypeScript, Python, Go, Java, C#, Rust, Swift, Kotlin, PHP, Ruby, C, C++, Scala, Dart, Shell/Bash, SQL, Terraform, CloudFormation, Dockerfile, GraphQL, Solidity and more. Language support is driven by the pattern database which is continuously expanded.
How does defense in depth work?
CodeMarine implements three scanning layers. Layer 1: Guardian at file save (under 50ms), catching issues the moment code is written. Layer 2: pre-commit hooks blocking vulnerable code before it enters version control. Layer 3: GitHub Action at PR time as a safety net and audit trail. By the time a PR comment appears, developers with Guardian have already fixed the issues.
What is the MCP server?
CodeMarine includes a Model Context Protocol (MCP) server that lets AI assistants invoke security scans directly. When connected to Claude Code, Cursor or other MCP-compatible tools, the AI can check its own generated code for vulnerabilities in real time, verify package names against registries and scan rules files for prompt injection. This enables AI assistants to self-check their output.
Is the beta free?
Yes. Full access with no limitations and no credit card required. Beta testers receive permanent founding member pricing when the product launches. After launch, pricing starts at $5/month for individuals (Scout), $20/month flat for teams up to 5 (Squad) and $9/dev/month for larger teams (Platoon). Free for public and open-source repositories.
How does the referral programme work?
When you sign up you get a unique referral code and join the queue. Referring other developers moves you up the queue and unlocks rewards. Private (0 referrals) is standard queue. Corporal (3) jumps to front 50%. Sergeant (10) gets first-wave beta access, Discord and 1 year Scout plan free. Captain (25) gets 1 year Platoon licence for you and 5 teammates. Colonel (100) gets lifetime Platoon for you and 5 teammates.
Can CodeMarine work in air-gapped environments?
Yes. CodeMarine runs entirely locally. The only network connection is to sync pattern databases from CodeMarine servers. For air-gapped environments, pattern databases can be manually transferred and loaded. Source code never leaves the machine under any circumstances.

Don't ship blind.

Join the first wave. Enlist now.

Free beta access. No credit card. Unsubscribe anytime.