SecPulse is for triage, disclosure, binary inspection, operator tooling, and evidence handling. The product is opinionated about the messy middle between “we found something” and “someone fixed it.”
0
Findings already tracked
0
Owner notifications sent
0
Confirmed remediations
Operator board
One queue. Four views.
Detection
Surfacerepo scan · binary scan · executable analysis
Text-first secrets, embedded credentials, and higher-interest binaries all feed the same queue.
Intelligence
Surfacereuse graph · scan delta · liveness
Pivot from a single finding into blast radius, comparable scan shifts, and verified-live history.
Disclosure
Surfaceevidence workspace · notes · owner contact
Attach artifacts, keep the trail clean, and move straight into a disclosure-ready workflow.
Active findings
Live
tracked across secrets, exposures, and disclosures
Owner contact loop
Ready
GitHub issue creation and remediation tracking built in
Usage model
Plans + credits
subscription for teams, pay-as-you-go for bursty work
The public site should prove there is a real platform underneath it. Start with breach checking, then look at how the current finding mix is distributed across the workspace.
The point is not to show more widgets. The point is to keep detection, triage, evidence, and disclosure in one system that feels coherent under pressure.
This is the current SecPulse surface area. The goal is less “feature list for investors” and more “here is the operating kit a researcher or team actually gets.”
SecPulse now runs a much broader catalog across SecOps and InfoSec. The platform covers discovery, posture review, config analysis, and offensive security checks from the same tool surface.
This isn’t just a prettier landing page. The product underneath moved closer to a real operator surface, and the public site should show that more honestly.
SecOps and InfoSec tools now run through one shared execution layer instead of a tiny hardcoded subset.
Stripe-backed credit purchases and superadmin-issued credits now feed the same paygo balance and transaction history.
Policy, owner notification loop, and trust language now point to real platform flows rather than placeholder destinations.
SecPulse AI streams replies, keeps session context, and drops repeat jailbreak attempts straight into roast mode instead of pretending not to notice.
The same product needs to work for solo researchers, product teams, and internal security operators. The shape of the work changes, but the workflow should not fall apart.
Start free. Upgrade when your scale demands it.
All prices in Australian dollars. Cancel any time.
Credits work alongside any plan for overages, or on their own without a subscription. No hidden fees, and token-authenticated tool runs are available through the paygo API.
API
2Scans
4Security tools
7AI
1Notifications
2Auto-detection for these providers — new ones added regularly.
We're a security platform — we hold ourselves to the same bar we ask of others.
We hash secret prefixes only. Full keys are never persisted or logged.
Strict CSP, HSTS, and cross-origin isolation. We scan our own headers daily.
No passwords on our side. Sign in with GitHub — we only see your public profile.
Every action — finding submission, role change, plan update — is logged and visible to you.
Open disclosure workflow. Contact security@secpulse.tech and we respond within 24h.
Neon Postgres with TLS at rest. Vercel edge deployment. Daily database backups.
Anything else? Email support@secpulse.tech.