Early access · waitlist open

Your on-call rotation
fixes itself before standup.

Eiryx turns any webhook event — Sentry, Datadog, GitHub, custom JSON — into reviewed Pull Requests, autonomously. Security scans, policy-as-code and event-driven pipelines, all in one platform.

Launching in the coming months — early-access invites go out first.

No credit card · Managed LLM included · Sandboxed by default
PR #421 · merged
tests: 47/47 ✓
Built for engineering leaders who want outcomes,
not another dashboard.
3:42am
median first PR
$0.32
avg cost per fix
47/47
tests pass-through
0copies
of your source retained
01 — How it works

Four steps. Zero manual hand-offs.

From the moment any service — Sentry, Datadog, your own app — POSTs a webhook, to the moment a reviewed PR lands on your board, every step runs in an isolated sandbox with the model of your choice.

T + 00:00
Detect

Alert intercepted

Any JSON webhook — Sentry, Datadog, GitHub, Grafana, your own backend — hits an Eiryx endpoint. Filters and JSONPath extractors decide if it's worth acting on.

sourcesentry.prod.api
severityerror
signalTypeError · /api/tasks
T + 00:23
Isolate

Agent deployed

A sandboxed Docker agent clones the repo, localizes the fault, and writes a minimal patch.

containerephemeral
modelclaude-4.6-sonnet
scope1 file · 8 LOC
T + 03:04
Verify

Tests pass

The patch runs against a clean container. Only changes that pass your test suite move forward — no exceptions.

unit32 / 32
integration15 / 15
quality0.61 · review
T + 04:54
Ship

PR opened

A Pull Request lands with diff, root-cause notes and test results attached. You review. You merge.

pr#421 open
diff+8 / −2
labelsagent · auto-fix
02 — One platform

Five things you'd otherwise glue together.

Scan, fix, automate, report and enforce — without stitching five tools and five invoices.

Security 02

Security scanner.

Semgrep-powered SAST, plus SCA, IaC and container scans. Findings land with severity, EPSS, and a branded PDF you can hand to your CISO.

  • SAST, SCA, IaC, container scans
  • OWASP Top 10 + EPSS scoring
  • Branded PDF reports
Orchestration 03

Event-driven pipelines.

Webhook, cron or manual triggers → extract → filter → act. Create tasks, run scans, store data, increment metrics, notify Slack — all from YAML.

  • Webhook, cron & manual triggers
  • YAML editor with dry-run testing
  • Pipeline marketplace and templates
Visibility 04

Reports & dashboards.

Weekly or monthly PDF reports, an email mailing list with TO/CC roles, and a Data Explorer for the datasets your pipelines produce.

  • Scheduled PDF reports (daily / weekly / monthly)
  • Mailing lists with TO / CC roles
  • Data Explorer with filters & pagination
Governance 05

Policy-as-code.

Set the rules once. License, security and PR-check policies block risky licenses, enforce SLAs per severity, and gate Pull Requests on your terms.

  • License policies (allow / warn / block)
  • Security policies with SLAs and EPSS thresholds
  • PR-check policies per repository
03Free scan

Try it on a public repo — no signup.

Give us a GitHub URL. We'll run a SAST pass and email you the PDF in under ten minutes.

Security scan · 2 min

Point us at a repo. We do the rest.

You'll get a report with severity, EPSS scoring and remediation hints — the same artifact our paying customers send to their CISO.

Public repos only · 3 scans / day · Report delivered by email.

Sample report
sql_injection · api/users.ts:42Critical
weak_crypto · lib/token.ts:18High
cors_misconfig · server.ts:210Medium
missing_rate_limit · routes/auth.tsLow
What we check
OWASP Top 10EPSS scoringCWE mappingSemgrep rules
04Use cases

Built for how teams actually work.

Three concrete moments. Three artifacts Eiryx produces so you don't have to.

03:42 AM

An alert fires while your team sleeps.

From Sentry, Datadog, a cron, or any service that can POST JSON — Eiryx intercepts it, classifies severity, spins up a sandboxed agent, patches the code, and runs your test suite. By morning, a PR with root-cause notes is waiting for review.

artifact · PR
Tuesday standup

Your CISO asks for the vulnerability report.

One click. Semgrep scans every connected repo, findings are grouped by severity and EPSS, and a branded PDF lands in your inbox. No manual audit.

artifact · PDF
Sprint review

The board wants to see the ROI.

Open the dashboard: resolved tasks, success rate, MTTR trend, cost saved. Export a PDF. Present the numbers. Done.

artifact · dashboard
05Pricing

Simple, transparent pricing.

Start free. Upgrade when you outgrow it. No credit card required.

Free

Try Eiryx on your repos. No credit card.

0/mo
 
  • 3 repositories
  • 1 pipeline (webhook or manual)
  • Security scanner (SAST)
  • Bring your own LLM key (BYOK)
  • YAML editor, event logs, dry-run
  • Community support

Pro

For tech leads who want autonomous fixes and proper reporting.

49/mo
 
  • Everything in Free
  • 10 repositories · 10 pipelines
  • Cron triggers + autonomous bugfix
  • Managed LLM included (no API key needed)
  • Store, increment & email/webhook notifications
  • License policies · Projects
  • PDF reports with email delivery
  • Data Explorer (5 datasets)
  • CI/CD API keys · Email support
Coming soon

Enterprise

For regulated teams, multi-org setups, and custom controls.

Custom
from €500/mo
  • Everything in Team
  • Unlimited repos, pipelines & datasets
  • PR-check policies per repo
  • SSO / SAML
  • Multi-team with audit logs
  • Custom policies & integrations
  • Dedicated onboarding
06Security

Security your CISO will actually sign off.

Your code never leaves the sandbox. Your keys are never stored in plaintext.

/ 01

AES-256 encryption

Every API key is encrypted at rest with Fernet AES-256. We never see or store them in plaintext.

/ 02

Sandboxed execution

Agents run in disposable Docker containers with no network path back to your infrastructure. One task, one container, then it's gone.

/ 03

No code retention

We clone, analyze, patch, and delete. Your repository source is never persisted on our servers — and we never use your code to train any model.

/ 04

Row-level security

PostgreSQL RLS on every table — tenants are cryptographically isolated at the database layer.

Your engineers have their tools. It is time you had yours.

Give your team autonomous fixes, enforced policies, and reports that write themselves — without changing how they ship. Launching in the coming months.

Join the waitlist