Analysis Types
Clipron AI offers three distinct analysis levels, each powered by different AI models and optimized for specific use cases. This guide helps you choose the right analysis type for your needs.Overview of Analysis Types
Ron AI 2 Mini
Quick Scan
- Google Gemini Flash
- 30-60 seconds
- 2-5 credits
- CI/CD integration
Ron AI 2 Standard
Comprehensive Audit
- DeepSeek Coder V2
- 1-3 minutes
- 5-15 credits
- Regular security audits
Ron AI 2 Ultra
Deep Analysis
- Claude 3.5 Sonnet
- 3-10 minutes
- 15-50 credits
- Pre-production audits
Ron AI 2 Mini (Quick Scan)
When to Use
CI/CD Integration
CI/CD Integration
Perfect for automated pipelines
- Fast feedback in development workflow
- Catch obvious security issues early
- Low cost for frequent scanning
- Minimal impact on build times
Initial Code Review
Initial Code Review
First pass security check
- Quick overview of security posture
- Identify major vulnerabilities
- Triage code before deeper analysis
- Educational tool for learning
Budget-Conscious Scanning
Budget-Conscious Scanning
Cost-effective security
- Limited credit budget
- High-frequency scanning needs
- Basic security compliance
- Proof of concept projects
What It Detects
- Common Vulnerabilities
- Code Quality Issues
- Compliance Basics
- SQL Injection: Basic injection patterns
- XSS: Cross-site scripting vulnerabilities
- CSRF: Cross-site request forgery
- Authentication Issues: Basic auth problems
- Input Validation: Missing validation checks
Example Use Cases
Ron AI 2 Standard (Comprehensive Audit)
When to Use
Regular Security Audits
Regular Security Audits
Balanced depth and speed
- Weekly or monthly security reviews
- Comprehensive vulnerability detection
- Business logic analysis
- Reasonable cost and time investment
Development Workflow Integration
Development Workflow Integration
Enhanced development security
- Pre-merge request analysis
- Feature branch security validation
- Code review assistance
- Security-focused development
Production Preparation
Production Preparation
Pre-deployment security
- Staging environment validation
- Release candidate analysis
- Security regression testing
- Compliance verification
Advanced Detection Capabilities
- Complex Vulnerabilities
- Framework-Specific Issues
- Advanced Code Analysis
- Business Logic Flaws: Multi-step attack vectors
- Race Conditions: Concurrency vulnerabilities
- Privilege Escalation: Authorization bypasses
- Data Flow Analysis: Taint tracking
- Cryptographic Issues: Weak crypto implementations
Example Configuration
Ron AI 2 Ultra (Deep Analysis)
When to Use
Critical System Analysis
Critical System Analysis
Maximum security depth
- Financial systems
- Healthcare applications
- Government systems
- High-value targets
Pre-Production Audits
Pre-Production Audits
Final security validation
- Production deployment preparation
- Security certification requirements
- Compliance audit preparation
- Risk assessment for critical releases
Security Research
Security Research
Advanced threat analysis
- Novel attack vector discovery
- Security research projects
- Penetration testing preparation
- Advanced threat modeling
Cutting-Edge Analysis
- Advanced Threat Modeling
- Deep Code Understanding
- Comprehensive Compliance
- Attack Chain Analysis: Multi-step attack scenarios
- Threat Actor Simulation: APT-style attack patterns
- Zero-Day Discovery: Novel vulnerability patterns
- Advanced Persistent Threats: Long-term compromise vectors
Advanced Configuration
Choosing the Right Analysis Type
Decision Matrix
By Use Case
By Use Case
| Use Case | Recommended Type | Reasoning |
|---|---|---|
| Daily development | Mini | Fast feedback, low cost |
| Code review | Standard | Balanced depth and speed |
| Pre-production | Ultra | Maximum security assurance |
| CI/CD pipeline | Mini | Speed and automation friendly |
| Security audit | Standard/Ultra | Depends on criticality |
| Compliance check | Ultra | Comprehensive coverage |
| Learning/training | Mini | Cost-effective exploration |
By System Criticality
By System Criticality
| System Type | Recommended Type | Frequency |
|---|---|---|
| Internal tools | Mini | Weekly |
| Customer-facing | Standard | Bi-weekly |
| Financial systems | Ultra | Monthly |
| Healthcare apps | Ultra | Before each release |
| E-commerce | Standard | Weekly |
| Open source | Mini/Standard | Per release |
By Team Size & Budget
By Team Size & Budget
| Team Size | Budget | Recommended Strategy |
|---|---|---|
| 1-5 developers | Limited | Mini for daily, Standard monthly |
| 6-20 developers | Moderate | Standard for features, Ultra quarterly |
| 20+ developers | Enterprise | All types based on component criticality |
Cost Optimization Strategies
Layered Approach
Use multiple analysis types strategically
- Mini for frequent scanning
- Standard for important features
- Ultra for critical components
- Optimize based on risk assessment
Targeted Analysis
Focus on high-risk areas
- Authentication and authorization code
- Payment processing logic
- Data handling components
- External API integrations
Analysis Results Comparison
Typical Results by Type
- Mini Analysis Results
- Standard Analysis Results
- Ultra Analysis Results