Review that fits the repository
Each repository can keep its own review setup, severity preferences, and scan behavior so the output stays relevant.
CodeGuards reviews every diff, surfaces real risks, and sends the result back to GitLab and your dashboard. Your team keeps moving, with more confidence in what ships.
CodeGuards stays deliberately simple. Connect a repository, let reviews run on each change, and read the verdict where your team already works.
Each repository can keep its own review setup, severity preferences, and scan behavior so the output stays relevant.
CodeGuards stays focused on the change being shipped, so teams can review risk without reopening months of old noise.
Findings show up on the merge request, in the dashboard, and in reports leadership can actually read.
No heavy rollout. No extra ceremony. The workflow fits around GitLab and your existing delivery process.
Drop a personal access token in. Cloud, self-hosted, dedicated — same form. We register a webhook so MRs are picked up automatically.
Each repository can keep its own review settings. Adjust severity, mute noise, and keep the output useful for that codebase.
Push a commit, open an MR, hit "Scan now" from the UI, or call the CI endpoint from any pipeline. CodeGuards reads only the diff.
Findings land back on the MR thread and in the dashboard. Severity is grouped, file paths are linked, and teams can keep the signal clean over time.
Whole-codebase tools have their place, but they often overload day-to-day delivery. CodeGuards keeps the review centered on the change in front of your team.
The detection model already runs on patterns from millions of real merge requests. On top of that, every repository builds its own memory: when a finding is fine for your codebase, mark it once — CodeGuards remembers the decision and silences the same pattern on that repo from then on. No more chasing the same false positive on every MR.
From the scan report, mark a finding as "matches our internal policy" with a short note. CodeGuards records the reason for the audit trail and the rest of the team sees why it was accepted.
Suppressions are scoped to the repository. The same pattern in another codebase still gets reported — your tolerance for an internal placeholder doesn't lower the bar for the next service.
When you accept a finding, historical verdicts are recomputed and dashboards stop nagging about it. New scans of the same repo skip it automatically — and you can restore it any time if your policy changes.
CodeGuards isn't a certification and doesn't try to be one. But because every change is reviewed for security from day one — not the week before an audit — the kind of paper trail SOC 2 (and similar frameworks) expect just builds itself in the background.
For each scan we persist who, what, when, the diff that was reviewed, the verdict, and the rationale. Exportable for the auditor's spreadsheet — no more reconstructing review history from chat threads.
When a finding is marked as covered by an internal policy, the note is stored against the repository with author and timestamp. That is exactly how a control owner is expected to record a compensating control.
Continuous code review with a written record is the kind of thing SOC 2 and similar audits like to see. With CodeGuards it's already running — not something you have to set up the week before someone asks.
CodeGuards isn't a SOC 2 (or ISO 27001, or PCI-DSS) certification — only an auditor can grant that. We just make the road there shorter, because the security-review evidence is already there when you start the conversation.
Cloud or self-hosted, the setup stays straightforward and close to the repository workflow.
Start small, prove the workflow, then roll it out wider when the reports are doing their job. See pricing →
Yes. Drop in a PAT for any GitLab instance — version 14.0 and up. CodeGuards talks to your GitLab API and registers a webhook on the project.
Review data is processed securely, and the workspace keeps the findings and reports teams need to act on.
Each repository keeps its own review setup and its own memory. Mark a finding as accepted on one repo and leave a short note about the internal policy it satisfies — CodeGuards silences the same pattern there from then on, while still reporting it on every other codebase.
Yes. From any scan report, mark the finding as a known false positive with a short note about which internal rule covers it. The decision is scoped to that repository, historical verdicts are recomputed, and future scans skip the same pattern automatically. You can restore it any time if your policy changes.
Indirectly, yes. Every scan leaves a timestamped record of what was reviewed, the verdict, and any decisions — exactly the kind of security-review evidence reviewers like to see. CodeGuards doesn't grant any certification (only an auditor can), but you don't have to build that paper trail from scratch.
Not yet. We're focused on shipping a tight GitLab integration first. GitHub support is on the roadmap; subscribe to the field notes if you want to know when.