Finding real vulnerabilities.
Verified in production.
Arbiter infers how web applications work, finds where they break, and verifies every exploit in a real browser. Aletheia loads binaries, decompiles to typed C, and finds vulnerabilities with concolic falsification. Both built in Rust. Both designed as MCP servers for AI agents.
Two tools. One mission.
Attack the web and reverse the binary. AI agents get structured, programmatic access to both.
Arbiter
Import traffic from any source. Arbiter builds a state graph of your target, infers authorization rules and ordering constraints, then searches for violations across 55 vulnerability classes — from XSS and IDOR to HTTP smuggling and race conditions. Every finding is verified in a real browser with evidence. Not a scanner — a reasoning engine.
Aletheia
Load PE, ELF, or Mach-O binaries. Aletheia disassembles, lifts to a custom IR, constructs SSA form, and decompiles to typed C with inter-procedural type recovery. A concolic falsification engine detects buffer overflows, command injection, and use-after-free with machine-checkable proofs. Built-in evasion detection, hybrid fuzzing, and taint tracking trace data flows across functions.
Proof, not promises.
Arbiter has been used to discover and responsibly disclose real vulnerabilities in production open source projects.
Anthropic Open Source
Vulnerability discovered in Anthropic's open source tooling — the company behind Claude. Responsibly disclosed and acknowledged by their security team.
Responsibly DisclosedCloudflare Open Source
Security issue identified in Cloudflare's open source infrastructure tooling, used by millions of websites globally. Ethically reported via their responsible disclosure program.
Responsibly DisclosedGoogle Firing Range
100% detection rate across all 85 test endpoints in Google's XSS Firing Range — the industry standard benchmark for vulnerability detection accuracy.
85/85 VerifiedWhy we build this way
Existing security tools weren't built for AI agents. They have GUIs, not APIs. Heuristics, not reasoning. Pattern matching, not constraint inference. We started from scratch.
Agent-First
Human GUIs are bottlenecks. Every capability is exposed as a structured MCP tool with JSON input and output. AI agents can orchestrate entire security assessments autonomously.
Rust, From Scratch
No wrappers. No FFI to legacy C code. Both tools are built in pure Rust with memory safety, zero-GC performance, and TDD-first development. Every component is tested before the next begins.
Deterministic Output
Security tools must be reproducible. Same input, same output. Structured JSON responses, explicit error handling, and full audit trails — the kind of reliability agents can depend on.
Both tools are in closed development.
Join the waitlist to get early access. Tell us which product you're interested in. No spam. One email when the beta opens.
Questions? Interested in collaborating?
[email protected]