Head-to-Head Comparison
CPG-based SAST + SCA — CPG-based SAST + SCA platform (acquired by Harness); IEEE award-winning Code Property Graph; 97% TPR claimed
| Capability | DryRun Security | Qwiet AI | Verdict |
|---|---|---|---|
| AI & Intelligence7 | |||
| AI-Native Architecture | ✓ AI-native since 2023; model-independent; multi-agent agentic system (Code Review Agent, DeepScan Agent, Custom Policy Agent, Codebase Insight Agent) |
~ CPG (Code Property Graph) is deterministic; AI layer for remediation. Not fully AI-native. |
DryRun leads |
| Business Logic Flaw Detection | ✓ IDOR, broken auth, multi-tenant isolation, logic flaws, mass assignment, privilege escalation, TOCTOU race conditions, OAuth failures, WebSocket auth bypass; 88% detection OOTB; outperformed 5 leading SAST tools (2025 SAST Accuracy Report) |
~ CPG detects multi-step logic bugs across modules; not AI-pentest level |
DryRun leads |
| Contextual / Semantic Code Analysis | ✓ Contextual Security Analysis (CSA): data flow, architecture, change history, intent, exploitability; detects issues pattern-based SAST cannot — middleware defined but not mounted, trust boundary misalignment, config not wired up; reads AGENTS.md |
✓ CPG unifies AST + control flow + data flow; full application understanding |
Tie |
| Vulnerability Coverage Breadth | ✓ 48+ vulnerability categories: SQLi, XSS, SSRF, IDOR, RCE, auth bypass, CSRF, XXE, path traversal, prompt injection, LLM tool misuse, OAuth failures, TOCTOU, WebSocket auth bypass, and more |
✓ Broad via CPG-based SAST + SCA + Secrets + IaC + Container; 97% TPR claimed |
Tie |
| Git Behavioral Analysis | ✓ Git Behavioral Graphs: code churn, temporal coupling, knowledge decay, temporal anomalies, intent mining |
✗ | DryRun leads |
| Natural Language Policies | ✓ Natural Language Code Policies (NLCP); Policy Library with 16+ pre-built policies; Custom Policy Agent enforces on every PR |
✗ | DryRun leads |
| False Positive Reduction | ✓ 90% lower noise; CSA-driven reasoning; Risk Register dismissal with fingerprinting suppresses FPs in future scans |
✓ Industry-leading 90% FPR reduction via reachability analysis; CPG context |
Tie |
| AI Coding Agent Security6 | |||
| Securing AI-Generated Code | ✓ Reviews all code equally — human or AI-generated; model-independent verification layer; Agentic Coding Security Report (Mar 2026): 143 issues found across Claude/Codex/Gemini builds, 87% of PRs had vulns |
~ CPG-based scanning works on AI-generated code; not purpose-built for AI code security |
DryRun leads |
| Malicious AI Agent Skill Detection | ✓ Policy Library includes Malicious AI Agent Skills Detection: flags skills/plugins that could enable data theft, backdoors, or code execution |
✗ | DryRun leads |
| MCP Integration | ✓ DryRun Insights MCP server: security summaries, PR analysis, trend monitoring, file-level history; connects via Direct HTTP, Claude Shortcuts, or mcp-remote |
✗ Notable gap vs. competitors; no MCP server. |
DryRun leads |
| AI Coding Tool Integrations | ✓ Native integrations: Cursor, Codex, Claude Code, Windsurf, VS Code (via Insights MCP + Add Skill); reviews output of any AI tool via PR workflow |
~ IDE plugins for VS Code/IntelliJ; no MCP for AI coding tools |
DryRun leads |
| AI Coding Visibility / Observability | ✓ Code Insights with AI Assistance (beta): NL queries for risk, trends, exposure; org-wide visibility; per-repo drill-down; file-level security history |
✗ | DryRun leads |
| AI Red Teaming / Threat Modeling | ✗ | ✗ | Tie |
| Code Security Intelligence3 | |||
| Code Security Knowledge Graph | ✓ Accumulates organizational knowledge across PRs; cross-repo intelligence; learns risk tolerance from dismissal patterns (nitpicks, FPs, accepted risks); FP fingerprinting improves decision quality over time |
✓ The CPG IS the canonical code security knowledge graph. IEEE award winner. Unifies AST + control flow + data flow. |
Tie |
| Model-Independent Verification | ✓ Separates code generation from code verification; works regardless of which AI model or human generates code |
~ CPG provides deterministic ground truth for AI agents. Multi-agent cross-verification. |
DryRun leads |
| Continuous Baseline & Risk Trending | ✓ Risk Register with Critical/High/Medium/Low severity; AI Assistance for Insights with NL queries, trend monitoring, and 30-day window analysis |
✓ Continuous CPG-based scanning; commit-by-commit tracking; risk trending dashboard |
Tie |
| Core Detection6 | |||
| SAST (Static Analysis) | ✓ AI-native Contextual Security Analysis engine; agentic multi-agent architecture; works on human and AI-generated code alike |
✓ CPG-based (Code Property Graph) with cross-file dataflow; 97% TPR claimed; IEEE award winner |
Tie |
| DAST (Dynamic Analysis) | ✗ | ✗ | Tie |
| SCA (Dependency / Supply Chain) | ✓ SCA agent with dependency and supply chain analysis; Risk Register tracks SCA findings by severity |
✓ Reachability-based SCA; reduces alerts 85-95%; 35+ ecosystems |
Tie |
| Secrets Detection | ✓ AI-native secrets analyzer; detects obfuscated secrets (concatenation, base64, logging); hard-coded credentials policy in Policy Library |
✓ Secrets v2 with entropy settings; customizable severity |
Tie |
| IaC Scanning | ✓ IaC scanning (Terraform, YAML, and infrastructure-as-code analysis) |
✓ Terraform, CloudFormation, YAML with AutoFix |
Tie |
| Container Scanning | ✗ | ✓ Container scanning included by default without additional licensing |
Competitor leads |
| Remediation & Fixes3 | |||
| Auto-Fix / AI Remediation | ✓ Tessl remediation skill for AI coding tools: extracts finding, researches authoritative sources, applies context-grounded fixes in the developer's codebase; co-authored commits; works in Cursor, Claude Code, Codex, VS Code |
✓ Multi-agent AutoFix with CPG context; ready-to-merge PRs |
Tie |
| Fix Verification / Re-testing | ✓ Re-runs DryRun Security analysis after remediation is applied to verify the fix resolves the finding |
~ AutoFix PRs re-scanned through CPG on next commit; no dynamic exploit re-test |
DryRun leads |
| Finding Dismissal & Triage Workflow | ✓ Risk Register with structured dismissal: Accepted Risk, False Positive, In Progress, Resolved, Won't Fix / Nitpick; learns risk tolerance of the repo and org from dismissal patterns (nitpicks, FPs, accepted risks); developer dismissal from PR comments (GitHub + GitLab) |
✓ Finding triage with status tracking; CPG-based prioritization; JIRA integration |
Tie |
| Developer Workflow5 | |||
| PR / Merge Request Reviews | ✓ Every PR; real-time contextual feedback; pass/fail checks; inline explanations; reads AGENTS.md for project context |
✓ PR-based scanning with inline findings and auto-fix suggestions |
Tie |
| Full Repository / Deep Scan | ✓ DeepScan Agent: full-repo security review in hours; discovers root and nested AGENTS.md for context; findings flow to Risk Register |
✓ Full CPG-based repository analysis; 97% TPR claimed |
Tie |
| IDE Integration | ✓ DryRun Insights MCP integrates with VS Code, Cursor, Windsurf, Claude Code, and Codex for security-aware coding assistance |
✓ VS Code and IntelliJ plugins; real-time scanning |
Tie |
| CI/CD Integration | ✓ GitHub and GitLab native integration; webhook notifications (Slack + generic) |
✓ Deep CI/CD integration; GitHub Actions, Jenkins, GitLab CI; policy enforcement gates |
Tie |
| SCM Support | GitHub and GitLab (native apps with OAuth) | GitHub, GitLab, Bitbucket, Azure DevOps | Tie |
| Coverage2 | |||
| Language Support | ✓ 15+ languages optimized: Python, JS/TS, Ruby, Go, C#, Java, Kotlin, PHP, Swift, Elixir, HTML, IaC (Terraform, YAML) |
✓ 10+ languages via CPG-based engine; Java, Python, JS, Go, C#, C++, Kotlin, PHP |
Tie |
| Out-of-Box Accuracy (No Tuning) | ✓ 88% detection rate OOTB; 2x more accurate than nearest competitor in independent testing |
✓ 97% TPR claimed; 90% FPR reduction via reachability; industry-leading OOTB accuracy |
Tie |
| Reporting & Compliance3 | |||
| Security Dashboard / Analytics | ✓ Risk Register (Critical/High/Medium/Low); AI Assistance for Insights with NL queries; Codebase Insight Agent; per-repo and file-level drill-down |
✓ Dashboard with CPG-based insights; findings by severity; compliance mapping |
Tie |
| Compliance / Audit Readiness | ~ Audit-ready reporting; policy enforcement evidence; structured finding dismissals with reasons and context |
✓ OWASP, NIST, ISO 27001, PCI DSS, SOC 2, CIS compliance mapping with audit logs. |
Competitor leads |
| SBOM / AI-BOM Generation | ✓ DeepScan generates SBOM; SCA agent provides dependency inventory and license checking (Dependency License Check policy) |
✓ Automatic SBOM generation for apps and containers. VEX export. Continuous monitoring. |
Tie |
| Architecture & Positioning4 | |||
| Agentic / Multi-Agent System | ✓ Code Review Agent, Custom Policy Agent, DeepScan Agent, Codebase Insight Agent + specialized sub-agents; AGENTS.md support (Linux Foundation) |
~ Multi-agent AutoFix system; agents focus on remediation rather than discovery |
DryRun leads |
| API / Extensibility | ✓ DryRun Simple API (REST); Swagger/OpenAPI spec; webhook integrations (Slack + generic); MCP server |
✓ REST API; CLI; SARIF output; Jira integration |
Tie |
| Approach / Category | ℹ Code Security Intelligence: continuous, model-independent layer that understands, evaluates, and enforces code security for both human and AI-generated code; used to benchmark Claude, Codex, and Gemini security (Agentic Coding Security Report, Mar 2026) |
ℹ CPG-based SAST + SCA platform (acquired by Harness, Sept 2025; rebranded as Harness SAST & SCA Feb 2026); IEEE award-winning Code Property Graph; 97% TPR claimed |
— |
| Key Structural Differentiator | ℹ Durable knowledge graph + model-independent verification: accumulates proprietary data about code behavior, vuln patterns, and org risk posture; proven benchmarking tool for AI coding agent security (Agentic Coding Security Report, Mar 2026) |
ℹ IEEE award-winning CPG is the canonical code security knowledge graph; 97% TPR + 90% FPR reduction; acquired by Harness for pipeline-native security (unique positioning); VEX export for SBOM |
— |
| Market Feedback (G2)4 | |||
| G2 Rating / Review Count | ℹ 4.9/5 (19 reviews) — g2.com/products/dryrun-security/reviews |
ℹ Not yet rated on G2 (listed under Harness following acquisition) |
— |
| Notable G2 Praise (Attributed) | ℹ "DryRun goes far beyond what rule-based SAST tools offer. It catches things other tools completely miss — like middleware that's defined but never mounted, or trust boundary misalignments." — Jabez A., Director, Product Security Architecture, Enterprise (g2.com/products/dryrun-security/reviews) |
ℹ Not yet rated on G2 (listed under Harness following acquisition) |
— |
| Notable G2 Criticisms (Attributed) | ℹ "I do somewhat wish there were more customization options for tuning the analyzers, but that seems to be in the works." — Kyle R. (g2.com/products/dryrun-security/reviews) |
ℹ Not yet rated on G2 (recently rebranded as Harness SAST & SCA following Sept 2025 acquisition) |
— |
| Common G2 Complaint Themes | ℹ UI/portal speed; desire for more analyzer customization (g2.com/products/dryrun-security/reviews) |
ℹ No G2 reviews yet (recently rebranded as Harness SAST & SCA); brand confusion during transition |
— |
Get a personalized demo and see how DryRun compares on your codebase.
Get a Demo