AISLE for Open Source
AISLE is committed to helping keep Open Source projects safe and secure. Our AI-powered analyzer is already making a difference in some of the most tested code bases on the planet.
Currently in private beta — access is granted after install.
Proven on the world's most heavily audited code bases
First results in minutes
01Install app
Add AISLE to your organization or repository from the GitHub Marketplace. One click, no configuration files.
02Select repo
Choose which repositories to enable. The bot stays dormant until explicitly triggered — no surprise comments.
03Tag analyzer
Mention @aisle-security in any PR comment. The bot analyzes the change and posts findings directly in the thread.
Access is currently allow-listed. After installing the app, our team will enable the bot. Until approved, tagging @aisle-security won't trigger a response.
Running on projects trusted by millions
http_aws_sigv4: fix query normalization #20550
bagder wants to merge into curl:master from feature/branch
@aisle-security thoughts?
🔒Aisle Security Analysis
✅ We scanned this PR and did not find any security vulnerabilities.
Aisle supplements but does not replace security review.
Enable RFC 7919 FFDHE groups for TLS 1.2 server #24551
jvdsn wants to merge into openssl:master from jvdsn:tls1_2-rfc7919
@aisle-security
🔒Aisle Security Analysis
We found 1 potential security issue(s) in this PR:
| # | Severity | Title |
|---|---|---|
| 1 | Medium | RFC7919 FFDHE compatibility check bypass for DHE-PSK cipher suites during server cipher selection |
Each finding is detailed in a separate comment below.
"AI found 12 vulns in OpenSSL — the same codebase that had enormous scrutiny after Heartbleed. Some of these findings are complex and non-trivial discoveries. We are in a new era. Hat tip to AISLE."

