Status
Category
Use Cases
Table of contents
Overview
Exaforce brings agentic, real time security to your GitHub organizations. By connecting to GitHub audit events, repository metadata, Actions workflows, and identity signals, Exaforce delivers high fidelity detections, guided investigations, and automated responses across your software supply chain.
Where legacy SIEMs struggle to stitch together developer activity, tokens, and repository posture, Exaforce normalizes and correlates this data in one place, accelerating time to detect while reducing false positives.
How it works
Exaforce continuously ingests and analyzes signals from GitHub through audit and activity streams, repository and workflow context, identity graph correlation, and SBOM enrichment. It maps relationships among identities, repositories, workflows, and dependencies to establish behavioral baselines and flag deviations that indicate risk.
Seamless GitHub onboarding
Deploy in minutes by installing the Exaforce GitHub App for your organization. Scopes are least privileged and read mostly by default. No agents, no fragile webhooks to maintain, and no manual tuning required.
Core capabilities
Monitor token and authentication use
Exaforce detects suspicious PAT, SSH, or OAuth token use, including leaked or reused tokens, unused scopes, and use from new geographies or autonomous systems. It factors in token privileges so that findings are more sensitive for high-privilege tokens, and traces each token’s activity back to the owning identity, device, and recent changes.
Detect potential code theft and exfiltration
It identifies mass clone or pull activity, unusual git fetch patterns, and suspicious commit behavior. Findings correlate with user cloud behavior, recent access grants, and SBOMs with impacted packages.
Network, ASN, and geolocation anomaly detection
Exaforce flags logins or API access from blocklisted countries, anonymizers, or unexpected ASNs. It distinguishes travel from takeover using historical patterns and multi-signal corroboration.
Identity correlation
Exaforce handles correlations of GitHub identities to corporate identities, endpoints, and cloud roles, building a unified investigation timeline and root cause analysis.
Repository and Actions visibility
Exaforce inspects GitHub Actions workflows, permissions, runners, artifacts, and secrets for risky behaviors such as unpinned actions, write token on forks, or self hosted runner exposure. It also provides insight into repository criticality and ownership, pull request hygiene, and dependency risk.
Posture and governance misconfigurations
Exaforce detects and prioritizes risky organization or repository posture, such as missing branch protection rules, unused repository access, and inactive users with lingering privileges or tokens. It highlights public forks, default branch direct pushes, secret exposure risk, and missing CODEOWNERS files.
AI triage to cut false positives
Exaforce’s agentic AI consolidates related findings, enriches them with identity and SBOM context, and automatically ranks urgency so teams focus on what truly matters.
Deep, guided investigations
Analysts can pivot from a detection into user, repository, and workflow timelines. They can follow token use, pull requests, approvals, Actions runs, and package changes in a single, clickable narrative using natural language queries or visual pivots.
Automated and guided response
Automated agents can take automated or approval gated actions, such as blocking users or creating an issue.
