We Built a Free Vulnerability Scanner for IDA Pro. Here's Why.

March 26, 2026

We Built a Free Vulnerability Scanner for IDA Pro. Here's Why.

If you reverse engineer binaries, you already know how this goes. You open a binary in IDA. You hit F5. You stare at pseudocode. You scroll. You grep mentally for patterns you've seen before - hardcoded keys, unsafe copies, sketchy API calls. You do this for hours.

It's tedious. It's error-prone. And if you're honest with yourself, you miss things.

The Problem

IDA is the best disassembler and decompiler on the market. But it has zero built-in awareness of security patterns. Hex-Rays gives you beautiful pseudocode and then leaves you completely on your own to figure out if that code is dangerous.

Every external SAST tool requires you to export code, run it through a separate pipeline, cross-reference line numbers back to IDA addresses, and context-switch constantly. Nobody actually does this in practice. So most binary analysis is still manual pattern recognition in your head.

That's a problem when you're auditing firmware, hunting 0days, or doing incident response on stripped binaries.

What We Did About It

Anthony Bondu, one of our security researchers, got tired of this and built a plugin. It's called IDA Security Scanner. It's open-source. It's free.

https://github.com/SymbioticSec/ida-security-scanner

Here's what it does: it takes the pseudocode output from Hex-Rays, runs SAST rules against it using Opengrep, and highlights dangerous patterns directly inside IDA. No export. No context-switching. No separate tool.

You press Ctrl+Shift+S to scan a function. Ctrl+Shift+L to scan the entire binary. Vulnerable functions get flagged in the Functions window. You click, you see the finding, you see the severity, you keep working.

What It Catches

Findings are graded by severity so you know what to look at first. It also has an optional AI explanation feature - point it at a finding and get a plain-language breakdown of why it's flagged and what the risk is.

What It Doesn't Do

It doesn't fix anything. It doesn't modify your IDA database. It doesn't phone home. It's a read-only scanner that tells you where to look.

It's also not magic. SAST on decompiled pseudocode has inherent limitations - variable names are gone, types are sometimes wrong, and the code is a reconstruction. But it catches patterns that are tedious to find manually, and it catches them in seconds instead of hours.

Who This Is For

If you use IDA, you should try it. It installs in under a minute and it's one less reason to stare at pseudocode hoping you'll spot the bug.

Get It

  1. GitHub: https://github.com/SymbioticSec/ida-security-scanner
  2. Hex-Rays Plugin Repo: hcli plugin install ida-security-scanner
  3. Works with: IDA 9.1 - 9.2 (more versions to be confirmed)

If you find something interesting with it, we'd love to hear about it. If you want to contribute rules, PRs are open.

About the author
Icon line
See all articles

Book a demo

See how our solution empowers teams to grow their security maturity and to code securely & efficiently.
Book a demo
Icon line
Demo illustration