Skip to main content

Your First Analysis in 5 Minutes

Get started with Clipron AI and run your first code security analysis in just a few minutes.

Step 1: Create Your Account

Visit clipron.com and choose your preferred registration method:
  • Google OAuth: One-click registration with your Google account
  • GitHub OAuth: Recommended if you plan to analyze repositories
  • Email & Password: Traditional registration method
After registration, you’ll receive:
  • Welcome email with account details
  • Initial credit balance for testing
  • Access to your personal dashboard

Step 2: Access Your Dashboard

Once logged in, you’ll see your main dashboard with:

Credit Balance

Your current credit balance for running analyses

Analysis History

List of all your previous analyses with security scores

Quick Actions

Buttons for new analysis, buying credits, and settings

Security Insights

Graphs showing vulnerability trends in your projects

Step 3: Run Your First Analysis

1

Start New Analysis

Click the “New Analysis” button on your dashboard.
2

Choose Code Source

Select how you want to provide your code:
  • Connect your GitHub account if not already linked
  • Select from your public or private repositories
  • Choose specific branches or commits
3

Select Analysis Type

Choose the appropriate analysis level:
  • Cost: 5-15 credits
  • Time: 1-3 minutes
  • Best for: Regular security audits, comprehensive analysis
  • Cost: 15-50 credits
  • Time: 3-10 minutes
  • Best for: Pre-production audits, critical components
4

Review & Submit

  • Review the estimated cost in credits
  • Confirm your analysis settings
  • Click “Start Analysis” to begin

Step 4: Understanding Your Results

Analysis typically completes within 1-10 minutes depending on code size and selected analysis type.
Your security report will include:

Security Score (0-100)

  • 90-100: Excellent security posture
  • 70-89: Good with minor issues
  • 50-69: Moderate vulnerabilities present
  • 30-49: Significant security concerns
  • 0-29: Critical vulnerabilities found

Detailed Findings

Immediate security threats requiring urgent attention:
  • SQL injection vulnerabilities
  • Authentication bypasses
  • Remote code execution risks

Fix Recommendations

Each vulnerability includes:
  • Description: What the vulnerability is and why it’s dangerous
  • Location: Exact file and line number where the issue occurs
  • Impact: Potential consequences if exploited
  • Solution: Step-by-step fix instructions with code examples

Next Steps