How it works
From code push to
security review
A technical overview of how Tachyon integrates with your repositories, analyzes code in isolated sandboxes, and delivers security findings directly in your pull requests.
Integration
Tachyon connects to your repositories via a GitHub App. Installation takes minutes — select the repositories you want to protect, approve read-only permissions, and Tachyon begins monitoring.
The GitHub App requests the minimum permissions needed: read access to code and pull requests, and write access to PR comments (for posting findings). Tachyon cannot push code, create branches, or modify repository settings.
Permissions requested
- Read — Repository contents, pull requests, metadata
- Write — Pull request comments (for posting findings)
- No access — Push, branch creation, settings, secrets, actions
Scan architecture
When a PR is opened or a deep scan is triggered, Tachyon provisions a dedicated, isolated sandbox for the analysis. Each sandbox is a fresh environment — not shared between customers, repositories, or scan runs.
Your code is cloned into the sandbox for the duration of the analysis. Sandboxes have no outbound network access, preventing data exfiltration even in a worst-case scenario. When the analysis completes, the sandbox is destroyed — code is never written to persistent storage.
Isolation
One sandbox per scan. No shared compute or state.
No egress
Sandboxes cannot make outbound network requests.
Ephemeral
Sandbox destroyed after analysis. No code retained.
Agentic analysis
Tachyon doesn't pattern-match against a rule database. It uses an AI agent that reads and reasons about your code the way a security engineer would — understanding data flows, authentication logic, trust boundaries, and business context.
The agent can navigate across files, trace function calls through multiple layers of abstraction, and evaluate whether a potential vulnerability is actually reachable and exploitable in practice. In some cases, it executes code paths in the sandbox to validate findings.
Why this matters
Traditional SAST
Matches patterns file-by-file. Can't reason about whether a finding is reachable or whether mitigations exist elsewhere in the codebase. High false positive rate.
Tachyon
Reads the full codebase. Traces data flows across services. Validates exploitability. Recommends structural defenses, not just patches.
Output and findings
Findings are delivered as inline PR comments — right where developers are already reviewing code. Each finding includes:
- VulnerabilityWhat the issue is and which code paths are affected.
- ExploitabilityWhether the vulnerability is reachable and exploitable in practice, with the attack path traced.
- RemediationRecommended fix with code suggestions, plus structural defense recommendations where applicable.
For deep scans (full-repository analysis), findings are collected in a scan report accessible through the Tachyon dashboard.
Ready to try it?
Install the GitHub App and get your first security findings in minutes. Or check out our pricing to find the right plan.