private preview · live rev0.0.4 build2026-04-17 prs reviewed12,847+1 findings · 24h3,291+1
Now in private preview · 7 design partners

Your next pull request ships a misconfigured security group to production. We catch it first.

OpsArmor Gate reviews every PR that touches cloud config. Blast radius and fix diff posted as a comment — before merge.

SOC 2 Type II in progress  ·  GDPR-aligned  ·  Self-host option

12,847 PRs reviewed across 7 design-partner organizations
4.1% Mean false-positive rate — every finding points to a real path
< 2s Median PR-comment latency from push to posted diff

§03Six capabilities, live in preview — one GitHub App.

No modules to buy. No add-ons to price. The list below is the product — and the numbers we hold ourselves to.

Terraform plan → attack graph

Gate parses every plan touching IaC, IAM, security groups, or bucket policies and scores changes against CIS, NIST, and SOC 2 — reasoning, not checklists.

Plan: 2 to add, 1 to change, 0 to destroy.
- aws_security_group.db_prod.cidr_blocks[0]
+ aws_security_group.db_prod.cidr_blocks[0] = "0.0.0.0/0"
+ aws_db_instance.orders_prod (publicly reachable)
            

Blast-radius graph

Identity, data flow, and network reachability modeled as one graph. Gate names the prod resources that actually become reachable.

IAM change diffs

Every role change in the PR annotated with what new permissions it unlocks — and who inherits them. (Continuous drift scans land Q3 '26.)

Bucket-policy checks

Public ACLs, wildcard principals, cross-account exports. Flagged with one-line rationale.

One PR, one comment, one suggested diff

Gate posts exactly one comment per pull request — what changed, new attack paths, prod resources reachable, and a suggested tightening. No drift into ten duplicate alerts.

blast radius fix diff compliance matches audit trail

OIDC & secrets

GitHub OIDC federation, short-lived tokens, zero stored cloud keys in your CI.

§04From pull request to shipped fix, in four steps.

Install once. First findings within the next PR. Gate stays read-only — your team writes the fix.

  1. Plan scanned.

    Gate reads the Terraform / Pulumi / AWS CDK plan on every pull request. Parse, normalize, hash.

  2. Graph built.

    Identity, network, and data-flow edges reconciled against your live cloud metadata. Read-only, least-privilege role.

  3. Rule matched.

    Policy engine runs on the delta only — CIS, NIST, SOC 2, plus your own rules. Highlights the exact line.

  4. Comment posted.

    One comment per PR. Blast radius, fix diff, compliance matches, signed audit bundle. You approve or you don't.

§05Works with your IaC.

The same policy, rendered three ways. Pattern-match in your stack — Gate reads Terraform, Pulumi, and AWS CDK.

policy/db_prod.{tf,py,ts} read-only · matched on diff
 1
 2
 3
 4
 5
 6
 7
 8
 9
10
11resource "aws_security_group" "db_prod" {
  name        = "db-prod"
  description = "Postgres — prod"

  ingress {
    from_port   = 5432
    to_port     = 5432
    protocol    = "tcp"
    cidr_blocks = ["10.0.0.0/8"]  # internal only
  }
}
 1
 2
 3
 4
 5
 6
 7
 8
 9
10
11import pulumi_aws as aws

db_prod = aws.ec2.SecurityGroup(
    "db-prod",
    description="Postgres — prod",
    ingress=[{
        "from_port":   5432,
        "to_port":     5432,
        "protocol":    "tcp",
        "cidr_blocks": ["10.0.0.0/8"],
    }])
 1
 2
 3
 4
 5
 6
 7
 8
 9
10
11import { SecurityGroup, Peer, Port } from "aws-cdk-lib/aws-ec2";

const dbProdSg = new SecurityGroup(this, "DbProdSg", {
  vpc,
  description: "Postgres — prod",
  allowAllOutbound: false,
});
dbProdSg.addIngressRule(
  Peer.ipv4("10.0.0.0/8"),
  Port.tcp(5432),
);

Gate flags the identical policy violation in all three — CIS AWS 4.1 · SOC 2 CC6.6.

§06Changelog.

Reverse-chronological. Dates on the left. In preview while Gate rolls out across design partners — GA items move up the list as they ship.

In preview

Gate — blast-radius PR comments

GitHub App reads IaC diffs, models reachability across identity and network, posts one comment per PR. Three IaC languages supported — Terraform, Pulumi, AWS CDK.

Shipping

Cloud posture + attack-path graph

Multi-cloud inventory, misconfiguration detection, blast-radius reasoning across identity and network. Powers every Gate finding.

Planned

AI Ops — autonomous SRE

Incident co-pilot with runbook execution and post-incident reports. Human-in-the-loop by default. Signed actions, guardrailed autonomy.

§07Pricing. Per developer. No "call us" under $100k.

Per-contributing-developer, with seat minimums so small teams stay affordable and big teams pay fairly. Preview pricing — design-partner rates lock for 12 months from GA. New teams join through the waitlist while items marked Q3 '26 ship before GA.

Preview pricing · GA Q3 2026. Gate is live across 7 design-partner orgs today. New customers join through the preview waitlist while compliance & enterprise controls ship before GA.

Free

$0forever

Up to 5 devs · solo & OSS

  • 1 private repo · unlimited public
  • 200 PR scans / month
  • Terraform only
  • 30-day audit log
  • SSO · SOC 2 · on-prem
Join free waitlist
Most popular

Team

$2923/ dev / mo

Min 10 devs · $290/mo floorMin 10 devs · billed annually · saves 20%

  • Unlimited private repos
  • Unlimited PR scans
  • Terraform · Pulumi · AWS CDK
  • 90-day audit log
  • Jira & Linear sync Q3 '26
Join team waitlist

Business

$5947/ dev / mo

Min 20 devs · $1,180/mo floorMin 20 devs · billed annually · saves 20%

  • Everything in Team
  • Unlimited audit retention
  • Kubernetes manifests Q3 '26
  • Hourly drift detection Q3 '26
  • SSO · SOC 2 · 99.9% SLA Q3 '26
Join business waitlist

Enterprise

Talk to us

annual · custom seats

  • Everything in Business
  • On-prem / self-host
  • Custom policies · named CSM
  • SIEM export · ISO 27001 Q3 '26
  • 99.95% SLA Q3 '26
Join enterprise waitlist

Read-only to your cloud. Ever. Seats = humans who push config changes; bots and service accounts are free. Pricing covers OpsArmor Gate only — the broader posture & attack-path platform is sold separately.

Private preview · waitlist only

Join the preview waitlist.

Tell us which cloud, which IaC, and where Gate would help first. We’re onboarding new teams through the waitlist and replying in batches.

Waitlist only. We use your email to follow up about preview access — nothing else.