Homeโ€บCompaniesโ€บwinfunc

AI Hacker for Codebases

Asterisk (asterisk.so) is an AI Hacker for Codebases - it automatically finds, verifies, and patches security vulnerabilities in codebases, just like a human security engineer would. Asterisk can find business logic errors with context-aware scanning and automate the full auditing cycle to generate reports with near-zero false positives. Asterisk has autonomously discovered vulnerabilities in Google, Hoppscotch, and others.
Active Founders
Mufeed VH
Mufeed VH
CEO / Founder
CEO @ Asterisk, Mufeed is an Olympian CTF-er (security hacking competitions) representing India at the WorldSkills Olympiad (๐Ÿ…), BRICS Skills (๐Ÿฅ‰), and IndiaSkills (๐Ÿฅ‡). He has worked on 300+ CVEs in open source. Secured Google, Mastercard, Okta, DELL, Ford, Zilliqa, EFF, Telefonica, etc. via Bug Bounty programs. mufeedvh.com
Vivek R
Vivek R
CTO / Founder
CTO @ Asterisk. Previously, Vivek built secure, fault tolerant distributed systems for leading POS validators handling a total stake of $2B+, did IoT protocol optimization research for startups, contributor to GStreamer - the leading multimedia framework used by Google, Apple, etc, helped Fortune 100 companies with their infrastructure strategy and optimization.
Company Launches
Asterisk: AI-automated Security team
See original launch post

TL;DR: Asterisk is an AI โ€œhackerโ€ with the ability to find, exploit, and patch security loopholes across your digital assets. It does all of this with no user intervention and generates a report with zero false positives. (example)

The Problem

  • Almost 95% of potential vulnerabilities raised by static security tools (SAST) are false positives, and security engineers spend a lot of time filtering them out.
  • Current security tech cannot detect business logic bugs - think of vulnerabilities like unauthorized access, privilege escalation, and bugs that would rack up your AWS/API bills.

Solution

  • Verification: Asterisk verifies a vulnerability by spinning up a sandbox, running the software being scanned, and attempts to exploit the bug. If Asterisk flags a vulnerability, you can be sure it's real.
  • Context-aware Threat Modeling: Asterisk understands your codebase and can thus emulate a malicious hacker by coming up with attack scenarios, like the recent CrowdStrike incident.

Our Team

We are Mufeed, Asjid and Vivek. All of us have a background in security research and systems engineering.

Mufeed: represented ๐Ÿ‡ฎ๐Ÿ‡ณ at WorldSkills CTF, ๐Ÿฅ‡ medalist - IndiaSkills CTF, ๐Ÿฅ‰ medalist - BRICS Skills CTF

Asjid: ๐Ÿฅˆ medalist - IndiaSkills, ex-security research engineer at Emirates National Bank (UAE)

Vivek: ex-distributed systems/platforms engineer at Chorus One (one of the biggest POS validators)

Our team has helped secure Google, Mastercard, Okta, Nvidia, Microsoft, etc. We are also the team behind Devika, the open-source alternative to Devin with over 18K stars on GitHub.

Our Ask

If you're looking for a complete security audit of your digital assets or want to talk about anything security, email us (hello@asterisk.so) or book a demo (asterisk.so/demo).

YC Photos
winfunc
Founded:2024
Batch:Summer 2024
Team Size:3
Status:
Active
Primary Partner:Diana Hu