The signal from AIxCC
DARPA concluded its two‑year AI Cyber Challenge (AIxCC) at DEF CON with remarkable results: finalist teams found 77% of injected bugs and patched 61%, even uncovering real‑world flaws. Four of the tools are now public, with agencies funding real deployments (Axios recap).
Bringing autonomous security to your org with Swfte
- Continuous scanning agents that triage findings, open tickets and verify patches
- Policy‑aware workflows that require approvals on sensitive repos and environments
- Evidence trails for audits with full execution traces and metrics
Where to start
Security teams typically pilot with:
- Open‑source dependency scanning + automated PRs
- High‑risk service scans gated by change‑management workflows
- Post‑fix validation tests using agent‑generated probes
See how we integrate CI/CD and approvals in our Developers docs, or contact us for a 2‑week pilot: Contact · Pricing.
Reference architecture
- Scan: nightly agents run SCA/SAST on critical repos
- Triage: LLM triage clusters findings; low‑confidence routes to humans
- Patch: templated fixes raised as PRs with test hooks
- Verify: post‑merge probes validate behavior in staging
- Report: audit trails sent to GRC system, with weekly digests
Controls and guardrails
- Repo allowlists / protected branches
- Mandatory approvers for high‑risk services
- Secrets redaction and PII scanners on logs
Metrics to watch
- MTTR per severity, reopen rate, % auto‑merged PRs
- False‑positive rate from triage, time saved per engineer
- Coverage: % repos and services under autonomous scans
FAQ
Will agents over‑patch and break production?
They can’t merge to protected branches, and must pass policy checks + tests. Start with advisory mode.
How do we keep findings private?
Swfte supports self‑hosting and encrypted connectors; logs can be routed to your SIEM.