Introducing Sandyaa: An Open-Source Autonomous Code Auditor

CVE-2025-57738 Apache Syncope Groovy Code Injection — Remote Code Execution
CVE-2025-57738: Apache Syncope Groovy Injection RCE
April 20, 2026

April 20, 2026

Most security tools can identify potential flaws, but they lack the contextual intelligence to determine if those vulnerabilities actually pose a real-world risk.

All this is set to change with the launch of Sandyaa, an open-source autonomous source code auditor, by SecureLayer7. This is designed to analyze a complete codebase and validate real vulnerabilities. Furthermore, it uses LLMs to understand code context, trace execution paths, and craft exploits — without any setup or an API key.

What is Sandyaa?

Sandyaa, powered by LLMs such as Claude, is an autonomous security bug hunter. Simply point it to a local directory or a Git repository, and it handles the entire code analysis. 

The system builds a contextual understanding across the codebase, identifies vulnerabilities, and generates exploit code for each finding. It compiles findings into structured reports, mapping issues directly to specific files and lines of code.

Platforms 

It offers platform support for the following:

  • macOS: Fully supported and actively tested.
  • Linux: Expected to work, though not yet actively tested.If you notice any blockers,  report them.
  • Windows (native): Native Windows is not supported. It uses Unix-only commands and invokes the Claude CLI directly, which fails on Windows. It can run on WSL2 using a Linux environment. Native Windows support requires changes or a community PR.

Vulnerability Coverage

Sandyaa can find the following categories of bugs: 

  • Memory safety: Use-After-Free, buffer overflow, type confusion, and double-free
  • Logic bugs: Auth bypass, TOCTOU, and state machine errors
  • Injection: SQL, command, XSS, SSRF, and path traversal
  • Crypto misuse: Weak algorithms, ECB, hardcoded keys, and bad randomness
  • Concurrency: Races, atomicity violations
  • Integer issues: Overflow, underflow, truncation, and signedness
  • Unsafe APIs: Deserialization, XXE, and prototype pollution

How It Works 

Sandyaa follows a structured approach as given below: 

  1. Accepts input: Direct it to a local directory or provide a GitHub repository link for Sandyaa to scan the assigned codebase.
  2. Builds context: Reads across files to understand how different code parts interact. 
  3. Breaks code: Splits large codebases into smaller chunks for efficient processing.
  4. Runs recursive analysis: Instead of scanning once, it revisits the code multiple times using LLMs to refine findings and identify deeper issues.
  5. Traces execution flows: Follows call chains and data movement through the application to identify vulnerabilities in logic and data handling.
  6. Filters real risks: Checks whether a vulnerability can actually be triggered in a real-world scenario. 
  7. Generates PoCs: For each validated vulnerability, Sandyaa creates working proof-of-concept code. 
  8. Produces structured reports: Organizes findings with clear references to file paths and line numbers, making it easier to locate and fix issues.

Key Features of Sandyaa 

The core capabilities of Sandyaa includes the following.

  • No setup required: Runs on your existing Claude Code login with no ANTHROPIC_API_KEY or additional configuration needed. 
  • RLM-based pipeline: Uses Recursive Language Models with a Python REPL, sub-LLM queries, and programmatic aggregation.
  • Multiple recursive passes: Performs recursive passes including call-chain tracing, data-flow expansion, self-verification, vulnerability chaining, PoC refinement, contradiction detection, assumption validation, and exploitability proof.
  • Attacker-aware filtering: Eliminates findings from untrusted inputs.
  • Evidence chain (evidence.json): Links each finding to the exact file and line number.
  • Dynamic chunk sizing: Adjusts code chunk sizes based on code density and token limits.
  • Checkpointing support: Resumes interrupted scans without restarting.
  • Optional Gemini support: Supports Gemini via CLI routing without requiring an API key.
  • Terminal dashboard: Provides a real-time view of analysis progress and findings.
  • Generates POC: Generates proof-of-concept code and can optionally execute it.

What Makes It Different

It has two key differentiators: 

  • First, Sandyaa operates seamlessly via your existing Claude Code authentication, eliminating the need for an ANTHROPIC_API_KEY, complex setup, or additional billing layers.
  • Second, it leverages a Recursive Language Model (RLM) approach to handle large and complex codebases. 

Getting Started

To get started, access the Sandyaa GitHub repository. Below are the steps to begin the process. 

A. Install 

Requirements:

  • macOS (actively tested), Linux (expected to work), or Windows via WSL2
    (Native Windows is not supported due to Unix-only commands and Claude CLI dependencies)
  • Node.js 18 or newer
  • Claude Code installed and logged in
  • git (used to clone remote repositories; auto-installed on macOS/Linux if missing)
code to install sandyaa

Gemini (Optional)

You can optionally run some parts of the analysis on Gemini instead of Claude: 

  • If the gemini CLI is available in your PATH and authenticated, Sandyaa will use it, no API key required as it reuses the CLI login.
  • If you use the REST API, export GEMINI_API_KEY before running Sandyaa.It’s used to resolve the latest Gemini model tiers at startup. Otherwise, static defaults apply. If neither is available, Sandyaa performs the entire analysis on Claude.

B. Usage

usage of sandyaa ai code auditor

C. Configuration

It now reads .sandyaa/config.yaml from the existing directory. An example is shown below: 

Configuration of sandyaa

D. Output Format

Sandyaa organizes findings into a structured directory for easy navigation and traceability.

  • It stores findings in the findings/ directory.
  • It organizes each bug into its own folder (e.g., bug-001-sql-injection/, bug-002-xss/).

Each folder contains the following sequentially: 

  • analysis.md
  • poc.py
  • SETUP.md
  • evidence.json

It provides a summary with evidence.json links that map each claim back to specific file paths and line numbers.

Conclusion

On a final note, Sandyaa shifts code security from merely listing issues to proving them. This makes findings easier to prioritize and act on, allowing teams to focus on vulnerabilities that are actually exploitable.

As codebases grow and software release cycles move faster, Sandyaa can be a gamechanger. While still in the early phase of development, it clearly shows how the code security is heading from detection to validation.

How to Contribute

If Sandyaa helped you identify a bug that was assigned a CVE, we’d like to hear about it. You can open a PR to add an entry in CVES.md along with the following details: 

  • CVE ID
  • Affected project and version
  • One-line description
  • Link to the public advisory or writeup
  • Clearly mention which Sandyaa phase surfaced it (context building, detection, recursive pass, etc.). 

Include only the CVEs that are already publicly disclosed. Avoid submitting embargoed findings.

For valid findings, add them to the case-studies/ folder in the github repository, while including the target repo, commit hash, analysis.md, and evidence.json.

Discover more from SecureLayer7 - Offensive Security, API Scanner & Attack Surface Management

Subscribe now to keep reading and get access to the full archive.

Continue reading