Skip to main content

Analysis Types

Clipron AI offers three distinct analysis levels, each powered by different AI models and optimized for specific use cases. This guide helps you choose the right analysis type for your needs.

Overview of Analysis Types

Ron AI 2 Mini

Quick Scan
  • Google Gemini Flash
  • 30-60 seconds
  • 2-5 credits
  • CI/CD integration

Ron AI 2 Standard

Comprehensive Audit
  • DeepSeek Coder V2
  • 1-3 minutes
  • 5-15 credits
  • Regular security audits

Ron AI 2 Ultra

Deep Analysis
  • Claude 3.5 Sonnet
  • 3-10 minutes
  • 15-50 credits
  • Pre-production audits

Ron AI 2 Mini (Quick Scan)

When to Use

Perfect for automated pipelines
  • Fast feedback in development workflow
  • Catch obvious security issues early
  • Low cost for frequent scanning
  • Minimal impact on build times
First pass security check
  • Quick overview of security posture
  • Identify major vulnerabilities
  • Triage code before deeper analysis
  • Educational tool for learning
Cost-effective security
  • Limited credit budget
  • High-frequency scanning needs
  • Basic security compliance
  • Proof of concept projects

What It Detects

  • SQL Injection: Basic injection patterns
  • XSS: Cross-site scripting vulnerabilities
  • CSRF: Cross-site request forgery
  • Authentication Issues: Basic auth problems
  • Input Validation: Missing validation checks

Example Use Cases

# CI/CD Pipeline Integration
- name: Quick Security Scan
  run: |
    curl -X POST "https://clipron.com/api/analysis" \
      -H "Authorization: Bearer $CLIPRON_API_KEY" \
      -d '{
        "source_type": "github",
        "content": "${{ github.repository }}",
        "analysis_type": "mini",
        "options": {
          "fail_on_critical": true
        }
      }'

# Daily Development Workflow
# Quick check before committing changes
clipron-cli scan --type=mini --path=./src --fail-on=high

Ron AI 2 Standard (Comprehensive Audit)

When to Use

Balanced depth and speed
  • Weekly or monthly security reviews
  • Comprehensive vulnerability detection
  • Business logic analysis
  • Reasonable cost and time investment
Enhanced development security
  • Pre-merge request analysis
  • Feature branch security validation
  • Code review assistance
  • Security-focused development
Pre-deployment security
  • Staging environment validation
  • Release candidate analysis
  • Security regression testing
  • Compliance verification

Advanced Detection Capabilities

  • Business Logic Flaws: Multi-step attack vectors
  • Race Conditions: Concurrency vulnerabilities
  • Privilege Escalation: Authorization bypasses
  • Data Flow Analysis: Taint tracking
  • Cryptographic Issues: Weak crypto implementations

Example Configuration

{
  "source_type": "github",
  "content": "https://github.com/company/web-app",
  "analysis_type": "standard",
  "options": {
    "focus_areas": [
      "authentication",
      "authorization", 
      "data_validation",
      "cryptography"
    ],
    "compliance_standards": [
      "owasp_top_10",
      "sans_top_25"
    ],
    "include_dependencies": true,
    "exclude_patterns": [
      "node_modules/",
      "*.test.js",
      "docs/"
    ]
  }
}

Ron AI 2 Ultra (Deep Analysis)

When to Use

Maximum security depth
  • Financial systems
  • Healthcare applications
  • Government systems
  • High-value targets
Final security validation
  • Production deployment preparation
  • Security certification requirements
  • Compliance audit preparation
  • Risk assessment for critical releases
Advanced threat analysis
  • Novel attack vector discovery
  • Security research projects
  • Penetration testing preparation
  • Advanced threat modeling

Cutting-Edge Analysis

  • Attack Chain Analysis: Multi-step attack scenarios
  • Threat Actor Simulation: APT-style attack patterns
  • Zero-Day Discovery: Novel vulnerability patterns
  • Advanced Persistent Threats: Long-term compromise vectors

Advanced Configuration

{
  "source_type": "github",
  "content": "https://github.com/company/critical-system",
  "analysis_type": "ultra",
  "options": {
    "threat_modeling": {
      "attack_scenarios": ["insider_threat", "apt", "supply_chain"],
      "threat_actors": ["nation_state", "organized_crime", "insider"],
      "attack_surfaces": ["web", "api", "mobile", "infrastructure"]
    },
    "compliance_frameworks": [
      "pci_dss",
      "hipaa",
      "sox",
      "nist_cybersecurity_framework"
    ],
    "analysis_depth": {
      "code_coverage": "maximum",
      "dependency_depth": 5,
      "data_flow_analysis": "comprehensive",
      "control_flow_analysis": "exhaustive"
    },
    "custom_rules": [
      "company_security_policy",
      "industry_best_practices"
    ]
  }
}

Choosing the Right Analysis Type

Decision Matrix

Use CaseRecommended TypeReasoning
Daily developmentMiniFast feedback, low cost
Code reviewStandardBalanced depth and speed
Pre-productionUltraMaximum security assurance
CI/CD pipelineMiniSpeed and automation friendly
Security auditStandard/UltraDepends on criticality
Compliance checkUltraComprehensive coverage
Learning/trainingMiniCost-effective exploration
System TypeRecommended TypeFrequency
Internal toolsMiniWeekly
Customer-facingStandardBi-weekly
Financial systemsUltraMonthly
Healthcare appsUltraBefore each release
E-commerceStandardWeekly
Open sourceMini/StandardPer release
Team SizeBudgetRecommended Strategy
1-5 developersLimitedMini for daily, Standard monthly
6-20 developersModerateStandard for features, Ultra quarterly
20+ developersEnterpriseAll types based on component criticality

Cost Optimization Strategies

Layered Approach

Use multiple analysis types strategically
  • Mini for frequent scanning
  • Standard for important features
  • Ultra for critical components
  • Optimize based on risk assessment

Targeted Analysis

Focus on high-risk areas
  • Authentication and authorization code
  • Payment processing logic
  • Data handling components
  • External API integrations

Analysis Results Comparison

Typical Results by Type

{
  "analysis_type": "mini",
  "duration": "45 seconds",
  "credits_used": 3,
  "security_score": 78,
  "vulnerabilities_found": 8,
  "coverage": {
    "files_analyzed": 45,
    "lines_of_code": 2500,
    "functions_analyzed": 120
  },
  "top_issues": [
    "SQL Injection (Critical)",
    "XSS (High)",
    "Hardcoded API Key (Medium)"
  ]
}
Analysis Tip: Start with Mini analysis to get familiar with the platform, then use Standard for regular development, and Ultra for critical releases or compliance requirements.