Product
Everything you need to secure code, cloud, and runtime– in one central system
Code
Dependencies
Prevent open-source risks (SCA)
Secrets
Catch exposed secrets
SAST
Secure code as its written
Container Images
Secure images easily
Malware
Prevent supply chain attacks
Infrastructure as Code
Scan IaC for misconfigurations
License Risk & SBOMs
Avoid risk, be compliant
Outdated Software
Know your EOL runtimes
Cloud
Cloud / CSPM
Fix misconfigs, exposures, risks.
DAST
Black-box security testing
API Scanning
Test your API’s for vulns
Virtual Machines
No agents, no overhead
Runtime Protection
In-app Firewall / WAF
Code Quality
soon
AI code quality review
Autonomous Pentests
soon
AI-driven attack testing
Defend
Features
AI AutoFix
1-click fixes with Aikido AI
CI/CD Security
Scan before merge and deployment
IDE Integrations
Get instant feedback while coding
On-Prem Scanning
Compliance-first local scanning
Solutions
Use Cases
Compliance
Automate SOC 2, ISO & more
Vulnerability Management
All-in-1 vuln management
Secure Your Code
Advanced code security
Generate SBOMs
1 click SCA reports
ASPM
End-to-end AppSec
CSPM
End-to-end cloud security
AI at Aikido
Let Aikido AI do the work
Block 0-Days
Block threats before impact
Industries
FinTech
HealthTech
HRTech
Legal Tech
Group Companies
Agencies
Startups
Enterprise
Mobile apps
Manufacturing
Public Sector
Resources
Developer
Docs
How to use Aikido
Public API docs
Aikido developer hub
Changelog
See what shipped
Security
In-house research
Malware & CVE intelligence
Trust Center
Safe, private, compliant
Learn
Software Security Academy
Students
Get Aikido free
Open Source
Aikido Intel
Malware & OSS threat feed
Zen
In-app firewall protection
OpenGrep
Code analysis engine
Aikido SafeChain
Prevent malware during install.
Integrations
IDEs
CI/CD Systems
Clouds
Git Systems
Compliance
Messengers
Task Managers
More integrations
Customers
About
About
About
Meet the team
Careers
We’re hiring
Press Kit
Download brand assets
Calendar
See you around?
Open Source
Our OSS projects
Customer Stories
Trusted by the best teams
Partner Program
Partner with us
BlogPricingContact
Login
Start for Free
No CC required
Menu
Login
Start Free

Introducing Zen: The In-App Firewall for Real-Time Protection

Security threats evolve faster than ever, and traditional defenses struggle to keep up. Web Application Firewalls (WAFs) rely on outdated blocklists and require constant rule updates, often leading to false positives and missed threats.

Enter Zen, the new product within Aikido Security—a fully embedded in-app firewall that stops attacks in real-time, right inside your application.

Get Peace of Mind at Runtime

Zen provides always-on security for your app, blocking critical injection attacks, implementing rate limiting for APIs, and giving you granular traffic control—without the overhead of traditional WAFs.

Zen is More Than a Firewall—It’s Runtime Protection

Other tools monitor from the outside, but Zen watches from within. This means:

Precision security

Detects unknown vulnerabilities based on logic execution, not just attack patterns.

No downtime fixes

Instead of taking applications offline, Zen provides actionable insights so developers can fix vulnerabilities without disrupting service.

Full developer context

Know exactly where threats occur, what’s impacted, and how to fix them within Aikido.

Stop zero-days in real-time

Zen prevents OWASP Top 10 and zero-day threats before they reach your database.

Minimal setup

Install in seconds. No manual configurations.

No maintenance

 No constant rule updates, no follow-ups, no babysitting.

Privacy-first

Unlike cloud-based WAFs, Zen never sends your sensitive data to third parties

Deeper insights & control

Understand threats inside your application and take targeted actions, unlike external-only defenses.

Block the Biggest Threats, Automatically

With Zen, security is proactive, not reactive. It continuously analyzes incoming requests, stopping attacks before they cause damage.

Prevent Critical Injection Attacks

Zen automatically blocks malicious attacks, including:

SQL & NoSQL Injection

Prevents database manipulation attempts (supports MySQL, MongoDB, Postgres & more).

Command Injection

 Stops attackers from executing unauthorized system commands.

Path Traversal

 Prevents unauthorized access to sensitive files and directories.

Mitigate API Abuse & Traffic Flooding

User-aware rate limiting

Stops brute-force attacks and bot-driven API abuse.

Granular blocking

Control access by IP, bot type, country, or Tor traffic.

Blacklist Known Threats

via partnership with CrowdSec, instantly block known malicious threat actors

Zen is Integrated into the Aikido Platform

Zen is not just an add-on; it's a core component of Aikido Security's central platform,

How Zen Works with Aikido

Developers start by connecting Aikido to their application, where the platform scans for vulnerabilities across their codebase. Zen is then installed directly into the application, providing immediate runtime protection. While developers continue coding and fixing vulnerabilities at their own pace, Zen remains active, blocking potential exploits in real-time.

The integration ensures a continuous feedback loop:
Aikido scans the codebase and detects vulnerabilities.
Zen defends the app against any attempts to exploit those vulnerabilities while fixes are in progress.
Aikido monitors fixes as developers deploy patches, reducing security risks over time.
Aikido tests the application for vulnerabilities, with dynamic surfacing monitoring (DAST), simulated real-world attacks, and API fuzzing– enhanced by Zen’s API discovery and monitoring.

Zen in Aikido’s Workflow

Zen is embedded into the Aikido platform, integrating defense within the wider context of application security. The connection between scan, test, defend, and fix is 

Full developer context

Know exactly where threats occur, what’s impacted, and how to fix them within Aikido.

Issue mitigation in the Aikido feed

When an exploitable issue is detected, Zen can instantly mitigate the risk, reducing its severity in real time.

Real-time severity updates

Developers can see when an issue's severity decreases because Zen is actively blocking threats.

Insightful logs

Developers can view detailed records of blocked attacks, their sources, and their patterns.

Smart rate limiting (coming soon)

Zen will adapt to malicious behavior, automatically fine-tuning security controls.

DAST-enhanced scanning

 By analyzing legitimate traffic, Zen informs Aikido’s DAST engine for more accurate security testing, eliminating guesswork in identifying vulnerabilities.

Why Zen? It’s a Game Changer for Security

Unlike traditional WAFs, Zen runs inside your application. This gives it deep context awareness, bridging the gap between shift left and shift right security. 

Zen vs. Other Solutions

Traditional security tools like WAFs and perimeter-based solutions provide limited visibility into what actually happens inside an application. They detect threats at the infrastructure level but lack the runtime insights needed to fully prevent sophisticated attacks. Zen changes the game by embedding protection directly inside your application.

Privacy

False Positives/Negatives

Rate Limiting

Performance Impact

Setup Complexity

Maintenance

Cost

API Security

Runtime Insights

Zen

No third-party key access
Minimal false positives/negatives
Minimal
Minimal false positives/negatives
User-aware
Minimal false positives/negatives
Negligible
Minimal false positives/negatives
One command, instant
Minimal false positives/negatives
No updates required
Minimal false positives/negatives
Open source, included in Aikido
Minimal false positives/negatives
Auto-generates Swagger docs
Minimal false positives/negatives
Full application context
Minimal false positives/negatives

Cloudflare WAF

Requires access to private keys
Minimal false positives/negatives
Higher risk
Minimal false positives/negatives
IP-based only
Minimal false positives/negatives
Adds ~100ms latency
Minimal false positives/negatives
Complex initial setup
Minimal false positives/negatives
Constant rule updates needed
Minimal false positives/negatives
Closed source, costs increase fast
Minimal false positives/negatives
No built-in API security
Minimal false positives/negatives
Perimeter only
Minimal false positives/negatives

Auto-generate
Swagger API Docs

Zen doesn’t just protect your APIs—it discovers them all, including undocumented or forgotten endpoints. Our context-aware DAST scans for vulnerabilities, simulating real-world attacks to keep your APIs secure.
Auto-gen API docs
To supercharge API security testing

Built for Developers: Simple, Fast, and Effective

Zen is lightweight, easy to install, and works out of the box. You can test it in dry mode before deploying, ensuring it fits seamlessly into your application. You can use Zen in ‘detection’ only mode to monitor events before turning on block mode.
Supported Platforms:
Coming Soon
Select your setup
Node.js
Python
PHP
Java
.NET
Ruby
Coming Soon!
For Node.js, just run:
npm install --save-exact @aikidosec/firewall
or
yarn add --exact @aikidosec/firewall
Then import Zen with:
require('@aikidosec/firewall');
pip install aikido_zen
or
poetry add aikido_zen
and import Zen to your
app.py
with just one line of code:
import aikido_zen
For detailed PHP installation instructions, please refer to the app’s documentation.
For detailed Java installation instructions, please refer to the app’s documentation.
For detailed .NET installation instructions, please refer to the app’s documentation.
npm install -- save-exact @aikidosec/zen
or
yarn add --exact @aikidosec/zen
and import Zen to your
app.js
with just one line of code:
require(‘@aikidosec/zen);
or
import‘@aikidosec/zen;
Tab 1
Tab 2
Tab 4
Tab 1
Tab 3
Tab 1
Zen for Node.js is compatible with :
✓ Express
✓ Hono
✓ Hapi
✓ Micro
✓ Next.js
Fastify
Coming Soon!
Zen for Python 3 is compatible with :
✓ Django
✓ Flask
✓ Quart
✓ Starlette
Tab 2
Tab 3
Tab 4
Zen for Python 3 is compatible with :
Django
Flask
Quart

Try Zen Now – Peace of Mind at Runtime

Zen is lightweight, easy to install, and works out of the box. You can test it in dry mode before deploying, ensuring it fits seamlessly into your application. You can use Zen in ‘detection’ only mode to monitor events before turning on block mode.
Get Zen now and stop attacks in real-time.
Company
ProductPricingAboutCareersContactPartner with us
Resources
DocsPublic API DocsVulnerability DatabaseBlogIntegrationsGlossaryPress KitCustomer Reviews
Industries
For HealthTechFor MedTechFor FinTechFor SecurityTechFor LegalTechFor HRTechFor AgenciesFor EnterpriseFor PE & Group CompaniesFor Government & Public SectorFor Smart Manufacturing & Engineering
Security
Trust CenterSecurity OverviewChange Cookie Preferences
Legal
Privacy PolicyCookie PolicyTerms of UseMaster Subscription AgreementData Processing Agreement
Use Cases
ComplianceSAST & DASTASPMVulnerability ManagementGenerate SBOMsWordPress SecuritySecure Your CodeAikido for MicrosoftAikido for AWS
Compare
vs All Vendorsvs Snykvs Wizvs Mendvs Orca Securityvs Veracodevs GitHub Advanced Securityvs GitLab Ultimatevs Checkmarxvs Semgrepvs SonarQube
Connect
hello@aikido.dev
LinkedInX
Subscribe
Stay up to date with all updates
Not quite there yet.
👋🏻 Thank you! You’ve been subscribed.
Team Aikido
Not quite there yet.
© 2025 Aikido Security BV | BE0792914919
🇪🇺 Registered address: Coupure Rechts 88, 9000, Ghent, Belgium
🇪🇺 Office address: Gebroeders van Eyckstraat 2, 9000, Ghent, Belgium
🇺🇸 Office address: 95 Third St, 2nd Fl, San Francisco, CA 94103, US
SOC 2
Compliant
ISO 27001
Compliant