Your First Analysis in 5 Minutes
Get started with Clipron AI and run your first code security analysis in just a few minutes.Step 1: Create Your Account
Sign Up Options
Sign Up Options
Visit clipron.com and choose your preferred registration method:
- Google OAuth: One-click registration with your Google account
- GitHub OAuth: Recommended if you plan to analyze repositories
- Email & Password: Traditional registration method
Account Verification
Account Verification
After registration, you’ll receive:
- Welcome email with account details
- Initial credit balance for testing
- Access to your personal dashboard
Step 2: Access Your Dashboard
Once logged in, you’ll see your main dashboard with:Credit Balance
Your current credit balance for running analyses
Analysis History
List of all your previous analyses with security scores
Quick Actions
Buttons for new analysis, buying credits, and settings
Security Insights
Graphs showing vulnerability trends in your projects
Step 3: Run Your First Analysis
1
Start New Analysis
Click the “New Analysis” button on your dashboard.
2
Choose Code Source
Select how you want to provide your code:
- GitHub Repository
- Paste Code
- File Upload
- Connect your GitHub account if not already linked
- Select from your public or private repositories
- Choose specific branches or commits
3
Select Analysis Type
Choose the appropriate analysis level:
Ron AI 2 Mini (Recommended for first try)
Ron AI 2 Mini (Recommended for first try)
- Cost: 2-5 credits
- Time: 30-60 seconds
- Best for: Quick vulnerability check, CI/CD integration
Ron AI 2 Standard
Ron AI 2 Standard
- Cost: 5-15 credits
- Time: 1-3 minutes
- Best for: Regular security audits, comprehensive analysis
Ron AI 2 Ultra
Ron AI 2 Ultra
- Cost: 15-50 credits
- Time: 3-10 minutes
- Best for: Pre-production audits, critical components
4
Review & Submit
- Review the estimated cost in credits
- Confirm your analysis settings
- Click “Start Analysis” to begin
Step 4: Understanding Your Results
Your security report will include:Security Score (0-100)
- 90-100: Excellent security posture
- 70-89: Good with minor issues
- 50-69: Moderate vulnerabilities present
- 30-49: Significant security concerns
- 0-29: Critical vulnerabilities found
Detailed Findings
- Critical Issues
- High Priority
- Medium Priority
- Low Priority
Immediate security threats requiring urgent attention:
- SQL injection vulnerabilities
- Authentication bypasses
- Remote code execution risks
Fix Recommendations
Each vulnerability includes:- Description: What the vulnerability is and why it’s dangerous
- Location: Exact file and line number where the issue occurs
- Impact: Potential consequences if exploited
- Solution: Step-by-step fix instructions with code examples