AI-only scanners are slow and miss vulnerabilities.
Parsentry uses static analysis to enumerate patterns, then orchestrates AI agents for deep inspection. Scan large repositories 10x faster (or more) while catching what others miss.
- Pattern Enumeration — Tree-sitter finds security-relevant code paths with PAR framework
- AI Orchestration — Agents analyze each pattern in parallel
- Universal — Support
C, C++, Go, Java, JavaScript, Python, Ruby, Rust, TypeScript, Terraform
mise use -g github:HikaruEgashira/parsentryDownload the latest release for your platform from GitHub Releases:
# Analyze a GitHub repository
parsentry owner/repository
# Analyze with Claude Code CLI
parsentry owner/repository --agent claude-code
# Analyze a local directory
parsentry /path/to/code
# Generate security patterns
parsentry owner/repository --generate-patterns❯ parsentry --help
Usage: parsentry [OPTIONS] [TARGET]
Arguments:
[TARGET] Target to analyze: local path or GitHub repository (owner/repo)
Core Options:
-a, --analyze <ANALYZE> Analysis target
-m, --model <MODEL> [default: gpt-5.1-codex]
--output-dir <OUTPUT_DIR> [default: ./reports]
--generate-patterns Generate security patterns
--language <LANGUAGE> [default: ja]
Agent Options:
--agent <AGENT> [default: genai]
Possible values: genai, claude-code
--agent-poc Enable PoC execution
Multi-Repository Variant Analysis (MVRA):
--mvra Enable multi-repository variant analysis
--search-query <MVRA_SEARCH_QUERY> GitHub search query for MVRA
--code-query <MVRA_CODE_QUERY> Code search query for MVRA
--max-repos <MVRA_MAX_REPOS> Max repos to analyze [default: 10]
- skills/secure-code-game - Security challenges across multiple languages
- harishsg993010/damn-vulnerable-MCP-server - MCP Server
- bridgecrewio/terragoat - Terraform
- RhinoSecurityLabs/cloudgoat - Infrastructure as Code (IaC)
- NeuraLegion/brokencrystals - Typescript
- OWASP/NodeGoat - Node.js
- OWASP/railsgoat - Ruby on Rails
- dolevf/Damn-Vulnerable-GraphQL-Application - GraphQL
- cider-security-research/cicd-goat - CI/CD Pipeline (analyzed with
--agent claude-code)
This tool is intended for security research and educational purposes only. Do not use the example vulnerable applications in production environments.
AGPL 3.0


