ZAST.AI Raises $6M Pre-A to Scale “Zero False Positive” AI-Powered Code Security
ZAST.AI’s $6M Funding Round Signals a New Era in Vulnerability Detection: From Speculation to Proof
SEATTLE, WA — January 5, 2026 — In a move that cybersecurity experts are calling “revolutionary,” ZAST.AI has announced the successful completion of a $6 million Pre-A funding round led by Hillhouse Capital. This latest investment brings the company’s total funding to nearly $10 million and marks a pivotal moment in the evolution of application security.
The funding arrives on the heels of ZAST.AI’s extraordinary achievements in 2025, during which the company discovered 119 verified CVEs across dozens of widely-used open-source projects. These weren’t theoretical vulnerabilities in obscure codebases—they were real, exploitable flaws found in production-grade software that powers businesses globally.
The False Positive Crisis: Why Security Teams Are Drowning
For years, security teams have been battling an invisible enemy: the false positive epidemic. Traditional static analysis tools have been generating alerts at an alarming rate, with false positive rates often exceeding 60%. This creates a cascade of problems that ripple through entire organizations.
“Imagine your security tool crying ‘wolf’ every single day,” explains Geng Yang, Co-founder of ZAST.AI. “By the time the real wolf appears, your team has already become desensitized. They’ve spent countless hours manually verifying alerts that turned out to be nothing, and their trust in the tools has eroded completely.”
This isn’t merely an inconvenience—it’s a systemic failure that costs enterprises millions in wasted productivity and leaves them vulnerable to actual threats. Security engineers find themselves caught in an endless cycle of investigation and dismissal, with their expertise being consumed by the Sisyphean task of separating signal from noise.
From “Potential Risk” to “Confirmed Vulnerability”: The ZAST.AI Breakthrough
What makes ZAST.AI’s approach fundamentally different is its commitment to verification over speculation. While traditional tools can only suggest potential vulnerabilities, ZAST.AI goes several steps further by automatically generating and executing Proof-of-Concept (PoC) code.
“We operate on a simple principle: ‘Report is cheap, show me the POC!'” Yang states. “If we can’t demonstrate that a vulnerability is real and exploitable, we don’t report it. Period.”
This methodology represents a complete paradigm shift in how vulnerabilities are discovered and validated. Instead of presenting security teams with a list of potential issues that may or may not be legitimate, ZAST.AI provides verified vulnerabilities accompanied by runnable PoC code that demonstrates the exact exploit path.
The Technical Architecture Behind the Magic
At the heart of ZAST.AI’s innovation lies its “Automated POC Generation + Automated Validation” architecture. This sophisticated system leverages advanced AI technology to perform deep code analysis that goes far beyond traditional static analysis.
The process works as follows: ZAST.AI’s AI engine analyzes application code, identifies potential vulnerability patterns, automatically generates PoC code designed to exploit those vulnerabilities, and then executes that PoC in a controlled environment to verify whether the vulnerability is real and exploitable.
Only after this rigorous validation process does a vulnerability make it into the final report. This approach has achieved what many in the industry thought impossible: a near-zero false positive rate.
Uncovering the Undiscoverable: Semantic-Level Vulnerabilities
One of ZAST.AI’s most impressive capabilities is its ability to identify semantic-level vulnerabilities—complex business logic flaws that have long been considered the “holy grail” of automated security testing. These include:
- IDOR (Insecure Direct Object Reference) vulnerabilities that allow unauthorized access to data
- Privilege escalation flaws that enable users to gain higher-level access
- Payment logic vulnerabilities that could be exploited for financial fraud
- Complex business rule bypasses that circumvent intended application workflows
These types of vulnerabilities are notoriously difficult for automated tools to detect because they often require understanding the application’s business logic and user workflows—something that traditional static analysis tools simply cannot do.
Real-World Impact: The 2025 Bug Hunter Report
In 2025 alone, ZAST.AI’s technology uncovered hundreds of zero-day vulnerabilities across popular open-source projects. These discoveries weren’t made in isolation—they were submitted through authoritative vulnerability platforms like VulDB and resulted in 119 CVE assignments.
The affected projects read like a who’s who of the technology industry:
- Microsoft Azure SDK – Critical vulnerabilities in cloud infrastructure components
- Apache Struts XWork – Framework vulnerabilities affecting countless web applications
- Alibaba Nacos – Configuration management system flaws
- Langfuse – OpenTelemetry and observability tool vulnerabilities
- Koa – Node.js web framework security issues
- node-formidable – File upload parsing vulnerabilities
What makes these discoveries particularly significant is that they were found in production-grade codebases that are actively used by millions of developers and enterprises worldwide. The maintainers of these projects, including teams from Microsoft, Apache, and Alibaba, have already patched their code based on the PoCs submitted by ZAST.AI.
The Capital Markets’ Vote of Confidence
Hillhouse Capital’s decision to lead this funding round isn’t just a financial investment—it’s a statement about where the future of application security is headed.
“This isn’t an optimization; it’s a reconstruction,” said a representative from Hillhouse Capital. “ZAST.AI has redefined the standard for vulnerability validation, shifting from ‘potential risk’ to ‘confirmed vulnerability, here is the PoC.’ This changes the game.”
The investment community clearly sees the potential in ZAST.AI’s approach. With total funding now approaching $10 million, the company is well-positioned to scale its technology and expand its market reach.
Enterprise Adoption: Fortune 500 Companies Lead the Way
ZAST.AI isn’t just a promising technology—it’s already delivering tangible value to enterprise customers. The company reports that it’s already serving multiple clients, including Fortune Global 500 companies, who are using its technology to transform their security operations.
By automatically discovering unknown vulnerabilities and providing runnable PoC reports, ZAST.AI helps clients significantly shorten vulnerability remediation cycles and reduce security operation costs. The feedback from early adopters has been overwhelmingly positive, with security teams reporting dramatic improvements in efficiency and effectiveness.
The Vision: An End-to-End AI-Driven Security Platform
Looking ahead, ZAST.AI has ambitious plans for the newly secured funding. According to CEO Geng Yang, the investment will be primarily used for core technology R&D, product feature expansion, and global market development.
“Our vision is to build an end-to-end AI-driven security platform,” Yang explains. “We want to enable every development team to obtain the highest quality security assurance at the lowest cost.”
This vision extends beyond just vulnerability detection. ZAST.AI aims to create a comprehensive security platform that integrates seamlessly into the software development lifecycle, providing security insights and validation at every stage of the development process.
The Future of Application Security
As cyber threats continue to evolve in complexity and sophistication, the need for more effective security tools has never been greater. ZAST.AI’s approach represents a fundamental shift in how we think about vulnerability detection and validation.
By moving from speculation to proof, from potential risk to confirmed vulnerability, ZAST.AI is setting a new standard for what security teams should expect from their tools. In an industry where false positives have long been accepted as an unfortunate reality, ZAST.AI is proving that there’s a better way.
The implications of this technology extend far beyond just improved efficiency. By providing verified vulnerabilities with executable PoCs, ZAST.AI is helping organizations build more secure software from the ground up, ultimately making the entire digital ecosystem safer for everyone.
Tags: #ZASTAI #Cybersecurity #VulnerabilityDetection #AI #Funding #CVE #EnterpriseSecurity #FalsePositives #ProofOfConcept #ApplicationSecurity #HillhouseCapital #TechInnovation #ZeroDay #OpenSourceSecurity #SecurityTools
Viral Phrases: “Report is cheap, show me the POC!” • “This isn’t an optimization—it’s a reconstruction” • “From speculation to proof” • “The false positive crisis is over” • “Verified vulnerabilities only” • “Automated validation that actually works” • “The future of security is here” • “Security teams rejoice: zero false positives” • “Changing the game in vulnerability detection” • “The wolf is real, and we can prove it”
,



Leave a Reply
Want to join the discussion?Feel free to contribute!