Common questions about Believe Security and Solana security
Believe Security is a specialized security analysis tool designed specifically for Solana programs. It combines static analysis techniques with GPT-powered pattern matching to identify potential security vulnerabilities, logical flaws, and best practice violations in your Solana programs.
Unlike traditional security tools, Believe Security understands Solana's unique architecture and common vulnerability patterns, providing more accurate and relevant security assessments for Solana developers.
Believe Security works by analyzing your Solana program's source code (or bytecode) to identify potential security issues. The analysis process involves several steps:
All analysis is performed in a secure, isolated environment, and your code is never shared with third parties or used to train our models.
Believe Security is specifically designed for Solana programs, with several key advantages:
Believe Security is a powerful tool that can identify many common security issues, but it's not a complete replacement for a professional security analysis conducted by human experts.
We recommend using Believe Security as:
For critical applications handling significant value, we still recommend combining Believe Security with a professional security analysis from a reputable security firm specializing in Solana.
Believe Security can detect a wide range of Solana-specific and general program vulnerabilities, including:
For a comprehensive list of all vulnerability types, see our Vulnerability Types documentation.
Believe Security currently supports Solana programs written in:
We plan to add support for additional Solana development frameworks in the future.
Believe Security strives for high accuracy in its findings, but like any security tool, it's not perfect. Our current metrics show:
We constantly work to improve accuracy by:
To minimize false positives, each finding includes detailed context and explanation, allowing you to quickly determine if a reported issue is relevant to your specific implementation.
Yes, Believe Security can analyze private repositories in several ways:
All access to private code is handled securely, and your code is never shared with third parties or used for training purposes without explicit consent.
Analysis time depends on the size and complexity of your program:
For very large or complex codebases, we offer options to focus the analysis on specific parts of your code to improve performance.
We take security and privacy seriously. Here's how we handle your code:
For organizations with stricter security requirements, we offer enterprise plans with additional security measures and data handling options.
No, by default we do not use your code to train our AI models. Your code is processed solely to provide you with analysis results.
In some cases, with explicit opt-in consent, we may use anonymized patterns from your code to improve our detection algorithms. This is always:
You can adjust your data usage preferences in your account settings at any time.
For maximum effectiveness, we recommend using Believe Security at multiple stages of your development process:
Many teams also integrate Believe Security into their CI/CD pipelines for continuous security monitoring.
We recommend addressing issues in this order:
Within each severity level, consider:
The Believe Security report includes detailed explanations and remediation steps to help you fix each issue efficiently.
If you believe a finding is a false positive:
Your feedback on false positives directly contributes to improving Believe Security for everyone. We review all reported false positives and use them to refine our detection systems.