GuardRails

GuardRails

  • Languages iconEnglish
    • 中文

›Overview

Overview

  • Introduction
  • What is GuardRails
  • Getting started
  • Findings
  • Vulnerabilities
  • Configuration
  • Custom Engines
  • False Positives
  • Enforce Passing Checks
  • Build Status on Pull Requests
  • FAQ
  • Pricing
  • Glossary
  • Tools & Licenses

API

  • Usage Guide
  • Endpoints

Vulnerabilities

  • Introduction
  • General

    • Overview
    • Hard-Coded Secrets

    Apex

    • Overview
    • Insecure Access Control
    • Insecure Network Communication
    • Insecure Processing of Data
    • Insecure Use of Cryptography
    • Insecure Use of Language/Framework API
    • Insecure Use of SQL Queries

    C/C++

    • Overview
    • Insecure Access Control
    • Insecure File Management
    • Insecure Processing of Data
    • Insecure Use of Cryptography
    • Insecure Use of Dangerous Function

    Dotnet

    • Overview
    • Insecure Access Control
    • Insecure Configuration
    • Insecure File Management
    • Insecure Processing of Data
    • Insecure Use of Cryptography
    • Insecure Use of Dangerous Function
    • Insecure Use of SQL Queries
    • Using Vulnerable Libraries

    Elixir

    • Overview
    • Insecure Configuration
    • Insecure File Management
    • Insecure Processing of Data
    • Insecure Network Communication
    • Insecure Use of Dangerous Function
    • Insecure Use of Language/Framework API
    • Insecure Use of SQL Queries
    • Using Vulnerable Libraries

    Go

    • Overview
    • Insecure File Management
    • Insecure Network Communication
    • Insecure Processing of Data
    • Insecure Use of Cryptography
    • Insecure Use of Dangerous Function
    • Insecure Use of SQL Queries
    • Using Vulnerable Libraries

    Java

    • Overview
    • Using Vulnerable Libraries
    • Insecure Use of SQL Queries
    • Insecure Use of Dangerous Function
    • Insecure Use of Regular Expressions
    • Insecure Authentication
    • Insecure Configuration
    • Insecure File Management
    • Insecure Use of Cryptography
    • Insecure Use of Language/Framework API
    • Insecure Processing of Data
    • Insecure Network Communication

    Javascript/TypeScript

    • Overview
    • Insecure Authentication
    • Insecure Processing of Data
    • Insecure Use of SQL Queries
    • Insecure Use of Regular Expressions
    • Insecure Use of Language/Framework API
    • Insecure Use of Dangerous Function
    • Using Vulnerable Libraries

    Kubernetes

    • Overview
    • Insecure Access Control
    • Insecure Configuration
    • Insecure Network Communication

    PHP

    • Overview
    • Insecure Configuration
    • Insecure File Management
    • Insecure Network Communication
    • Insecure Processing of Data
    • Insecure Use of Dangerous Function
    • Insecure Use of Language/Framework API
    • Insecure Use of Regular Expressions
    • Insecure Use of SQL Queries
    • Using Vulnerable Libraries

    Python

    • Overview
    • Insecure Configuration
    • Insecure Use of Cryptography
    • Insecure Network Communication
    • Insecure Processing of Data
    • Insecure Use of Dangerous Function
    • Insecure Use of SQL Queries
    • Using Vulnerable Libraries

    Ruby

    • Overview
    • Insecure Access Control
    • Insecure Configuration
    • Insecure File Management
    • Insecure Network Communication
    • Insecure Processing of Data
    • Insecure Use of Dangerous Function
    • Insecure Use of Language/Framework API
    • Insecure Use of Regular Expressions
    • Insecure Use of SQL Queries
    • Using Vulnerable Libraries

    Rust

    • Overview
    • Using Vulnerable Libraries

    Solidity

    • Overview
    • Insecure Integer Arithmetic
    • Insecure Use of Low-Level Call
    • Reliance on Insecure Random Numbers
    • State Change After External Call
    • Transaction Order Dependence
    • Unprotected Critical Function
    • Use of Insecure Function
    • Dependence on Predictable Environment Variables
    • Write to Arbitrary Storage Location
    • Call to Untrusted Contract

    Terraform

    • Overview
    • Hard-Coded Secrets
    • Insecure Access Control
    • Insecure Configuration
    • Insecure Network Communication
    • Insecure Use of Cryptography

Pricing

Since our first public release in 2018, our pricing model has been tied to repositories and hasn't changed at all. We have been now operating for several years and are used by thousands of developers and companies around the globe. Our initial pricing model no longer reflects the value GuardRails provides and the levers it is tied to. We are glad to announce our new pricing model and pricing plans that are even better tailored to the needs of our growing user base.

New Pricing Plans

The new pricing plans are no longer tied to repositories, but to active developers. An active developer is defined as anyone (including bots) that are committing towards a code base within a 30 day window. Based on the paid plan you are on, there is a minimum amount of developers regardless of activity. E.g for the standard plan that's one developer, for the professional plan it is 10 developers.

Free Plan

This tier is for individuals and small teams that can get value from GuardRails and don’t have to pay for it. This plan only supports scanning of PRs and on-demand via the dashboard, but not scanning of every commit. This plan starts with 1 active developer and can be increased to up to 5 active developers by leaving reviews on accepted sites, providing testimonials, etc. For more information please contact [email protected].

Standard Plan

This is the first paid tier that is coming with most core features, starting with at least 1 developer. This plan only supports scanning of PRs and on-demand via the dashboard, but not scanning of every commit. Insights are supported, as are custom configuration of engine rules. Scan results retention is capped at 30 days.

Professional Plan

The professional plan comes fully featured, without any restrictions and starts at 10 active developers. The plan supports scanning of all code-changes, custom engines, full language support, and unlimited scan result retention.

Enterprise Plans

The Enterprise Plans is fully featured, without any restrictions, starts at 25 developers and allows deploying GuardRails in your own data center. You can reach out to [email protected] to start an on-premise trial.

Legacy Plans

All our existing paid users that are on legacy plans will be able to retain their plans for the forseeable future. If you are interested in upgrading to the new plans, we are happy to support you with that and will extend discounts. Reach out to us at [email protected] to learn more.

← FAQGlossary →
  • New Pricing Plans
    • Free Plan
    • Standard Plan
    • Professional Plan
    • Enterprise Plans
  • Legacy Plans
  • Status
  • Help
  • Security
  • Terms
  • Privacy

© 2021 GuardRails