Skip to content
Bearer

Bearer

NEW ACQUIRED
Category: SAST
License: Open Source (ELv2) / Part of Cycode
Suphi Cankurt
Suphi Cankurt
+7 Years in AppSec
Updated March 4, 2026
6 min read
Key Takeaways
  • Open-source SAST tool that ranks vulnerabilities by whether they expose sensitive user data โ€” detects 120+ sensitive data types including PII, PHI, and financial records
  • 473 built-in security rules (OWASP Top 10, CWE Top 25) across 7 languages: JS, TS, Ruby, Java, Go, Python, PHP
  • Only open-source SAST scanner that generates privacy reports for GDPR/CCPA compliance alongside security findings
  • Acquired by Cycode in April 2024 โ€” CLI still free under ELv2, Bearer Pro adds cross-file analysis for Java, Python, C#, Kotlin, Elixir via Cycode platform

Bearer is an open-source SAST scanner that prioritizes vulnerabilities based on whether they expose sensitive user data โ€” not just severity scores. It traces how personal, financial, and health information flows through application code, then re-ranks findings so the issues that actually put user data at risk surface first.

The CLI ships with 473 built-in security rules covering the OWASP Top 10 and CWE Top 25, detects 120+ sensitive data types, and supports seven languages: JavaScript, TypeScript, Ruby, Java, Go, Python, and PHP.

It also generates privacy reports alongside security findings โ€” the only open-source SAST tool that does both.

Cycode acquired Bearer in April 2024. The CLI remains free under the Elastic License v2 (ELv2). Bearer Pro, available through the Cycode ASPM platform, adds cross-file and interprocedural analysis with support for additional languages including C#, Kotlin, and Elixir.

What is Bearer?

Bearer is a static application security testing (SAST) tool that scans source code for security vulnerabilities and privacy risks.

It differs from conventional SAST scanners by adding a sensitive data context layer: instead of treating every finding equally, Bearer identifies 120+ sensitive data types (PII, PHI, financial records) and traces how they flow through the application.

Findings that expose real user data get ranked higher than those affecting non-sensitive variables.

The scanner produces three report types from a single command. The security report covers vulnerabilities with CWE mappings and remediation guidance.

The privacy report maps how sensitive data gets collected, processed, and stored across the codebase โ€” directly useful for GDPR, CCPA, and DPIA compliance audits. The data flow report provides a detailed breakdown for building data catalogs.

Data-Centric Prioritization
Traces 120+ sensitive data types through code and ranks findings by what they actually expose โ€” PII, financial data, health records.
Privacy & Compliance Reports
Maps how sensitive data gets collected, processed, and stored. Generates reports for GDPR, CCPA, and DPIA audits from the same scan.
Open Source CLI
Free under ELv2. Runs locally, integrates with CI/CD, outputs SARIF for GitHub Code Scanning, GitLab SAST, and similar platforms.

How does Bearer’s data flow analysis work?

Bearer’s core differentiator is sensitive data flow tracking. The scanner identifies where sensitive data enters the application (user input, API calls, database queries), traces how it moves through functions, and flags where it ends up (logs, external APIs, storage).

That data flow map is what powers both the security prioritization and the privacy reports.

The free CLI performs single-file data flow analysis. Bearer Pro, available through the Cycode ASPM platform, adds cross-file and interprocedural analysis โ€” tracing data flows across function and file boundaries. On the OWASP Java Benchmark, Bearer Pro scored 76% with a false positive rate below 2%.

What security vulnerabilities does Bearer detect?

Bearer ships with 473 built-in security rules covering the OWASP Top 10, CWE Top 25, and language-specific patterns. The rules detect:

  • SQL injection and NoSQL injection
  • Cross-site scripting (XSS)
  • Path traversal and file inclusion
  • Insecure cryptography and hashing
  • Hardcoded secrets and credentials
  • Insecure HTTP configurations
  • Broken access control
  • Server-side request forgery (SSRF)

Each finding includes a description, severity rating (Critical, High, Medium, Low, Warning), CWE mapping, and remediation guidance.

What makes Bearer different: findings get re-ranked based on sensitive data exposure. A SQL injection that leaks user emails surfaces above one that exposes a non-sensitive counter variable.

Under the hood, Bearer combines rule-based pattern matching for CWEs with cross-file dataflow in source code. The 473 rules implement OWASP Top 10 and CWE Top 25 patterns; the dataflow engine traces sensitive data from source to sink and re-ranks findings by exposure rather than just severity.

bearer scan output showing security findings ranked by sensitive data exposure โ€” Critical SQL injection exposing Email Address and Password ranked above lower-severity findings
bearer scan output: findings ranked by sensitive data exposure. Critical SQL injection leaking Email Address and Password surfaces first; CWE IDs and rule names are shown for each finding.

How does Bearer generate privacy reports?

The privacy scanner detects 120+ sensitive data types in the codebase โ€” emails, passwords, IP addresses, health records, financial data, biometric identifiers โ€” and maps how each type flows through the application.

The output is a structured report that compliance teams can use during data protection audits for GDPR, CCPA, HIPAA, or DPIA assessments.

It runs alongside the security scan. One bearer scan command produces both security findings and privacy analysis. The separate --report=privacy flag generates the privacy-focused output, while --report=dataflow produces a detailed data flow breakdown suitable for building data catalogs.

bearer scan --report=privacy output showing personal data collection, third-party sharing, and storage components mapped across the codebase for GDPR and CCPA compliance
bearer scan --report=privacy: maps where sensitive data is collected (Email, IP, Health Record), which third-party services receive it, and which storage components hold it โ€” ready for GDPR Article 30 records or DPIA submissions.

Does Bearer detect secrets?

Bearer includes a secret detection mode powered by the Gitleaks engine. It catches hardcoded API keys, tokens, passwords, and credentials.

It covers common patterns without needing a separate scanner, though dedicated tools like GitGuardian or TruffleHog offer deeper coverage with historical commit scanning and real-time monitoring.

How do you install and run Bearer?

Bearer scans a typical codebase in 20 seconds to a few minutes depending on project size. Here is how to get started:

1
Install Bearer CLI โ€” Homebrew (brew install bearer/tap/bearer), install script, Docker, or grab the binary from GitHub .
2
Run your first scan โ€” bearer scan . in your project directory. You get a prioritized security report in the terminal with findings ranked by sensitive data exposure.
3
Generate a privacy report โ€” bearer scan . --report=privacy produces a data flow map showing how sensitive data gets collected, processed, and stored.
4
Export for CI/CD โ€” bearer scan . --format=sarif outputs SARIF, which works with GitHub Code Scanning, GitLab SAST, and similar platforms. Bearer also supports diff-scanning for pull requests.

What languages does Bearer support?

Bearer CLI (free) and Bearer Pro (Cycode) support different language sets:

LanguageBearer CLI (Free)Bearer Pro (Cycode)Framework Coverage
JavaScriptYesYesExpress, Fastify, Node.js
TypeScriptYesYesSame as JS + TS-specific patterns
RubyYesYesRails, general Ruby
JavaYesYes + cross-fileSpring, Jakarta, general Java
GoYesYesStandard library, common frameworks
PythonYesYes + cross-fileDjango, Flask, general Python
PHPYesYesLaravel, Symfony, general PHP
C#โ€”Yes + cross-file (alpha).NET, ASP.NET
Kotlinโ€”YesAndroid, Spring
Elixirโ€”YesPhoenix, general Elixir
VB.Netโ€”Yes.NET

What happened after Cycode acquired Bearer?

Cycode announced the acquisition in March 2024 and closed the deal on April 30, 2024 . Bearer’s scanning engine, privacy analysis capabilities, and engineering team all moved to Cycode.

The latest release is v2.0.1 (February 2026), showing continued active development.

The CLI stayed open source under ELv2. Cycode released it as part of their Cygives developer initiative, which also includes open-source tools like Raven and Cimon.

Bearer Pro โ€” adding cross-file analysis, interprocedural tracing, and additional language support (C#, Kotlin, Elixir, VB.Net) โ€” is only available through the Cycode ASPM platform.

When should you use Bearer?

Bearer makes the most sense for teams whose applications handle personal data, health records, or financial information.

The data-centric prioritization means developers spend less time wading through hundreds of generic findings to reach the ones that actually put user data at risk.

It also pairs well with other SAST tools. Running Semgrep for broad rule coverage and Bearer specifically for its privacy reports is a practical combination โ€” no other open-source SAST scanner generates compliance-ready privacy reports.

Best for
Teams building applications that handle sensitive user data, especially if you need compliance evidence for GDPR, CCPA, HIPAA, or similar regulations. The privacy reports alone justify adding Bearer to your pipeline.

How does Bearer compare to alternatives?

FeatureBearer CLISemgrep CESonarQube CE
LicenseELv2LGPL-2.1LGPL-3.0
Languages730+17
Security rules4733,000+ community5,000+
Data flow prioritizationYes (sensitive data)NoNo
Privacy reportsYesNoNo
Secret detectionYes (Gitleaks)Pro onlyNo
Cross-file analysisPro onlyPro onlyYes
SARIF outputYesYesVia plugin

Bearer’s advantage is narrow but deep: sensitive data flow tracking and privacy reporting. If you need broader language coverage, Semgrep or SonarQube support more ecosystems. If you’re already on the Cycode ASPM platform, Bearer Pro gives you cross-file analysis, additional languages, and centralized findings management.

Frequently Asked Questions

What is Bearer?
Bearer is an open-source static application security testing (SAST) tool that scans source code for security vulnerabilities and prioritizes findings based on sensitive data exposure. Unlike conventional SAST tools that treat every finding equally, Bearer traces how data like emails, passwords, health records, and financial information flows through an application. It includes 473 built-in security rules covering the OWASP Top 10 and CWE Top 25, detects 120+ sensitive data types, and generates both security and privacy reports from a single scan. Cycode acquired Bearer in 2024, but the CLI remains free and open source under ELv2.
Is Bearer free?
The Bearer CLI is free under the Elastic License v2 (ELv2). It includes all 473 security rules, privacy reporting, secret detection, and single-file data flow analysis at no cost. Bearer Pro, which adds cross-file and interprocedural analysis, is part of the Cycode ASPM platform and requires a paid subscription.
What languages does Bearer support?
The free Bearer CLI supports JavaScript, TypeScript, Ruby, Java, Go, Python, and PHP. Bearer Pro through Cycode adds C#, Kotlin, Elixir, and VB.Net. The scanner covers both application code and configuration files, with framework-specific rules for Express, Rails, Spring, Django, Laravel, and others.
How does Bearer differ from other SAST tools?
Bearer adds a sensitive data context layer that most SAST tools lack. While tools like Semgrep or SonarQube report all vulnerabilities with equal weight, Bearer traces 120+ sensitive data types through the codebase and re-ranks findings accordingly. A SQL injection that leaks user emails gets flagged higher than one that leaks a debug counter. Bearer also generates privacy reports mapping how personal data gets collected, processed, and stored โ€” something no other open-source SAST tool does.
What happened to Bearer after the Cycode acquisition?
Cycode announced the acquisition of Bearer in March 2024 and closed the deal on April 30, 2024. The CLI stayed open source as part of Cycode’s Cygives developer initiative. Bearer’s scanning engine now powers Cycode’s SAST capabilities in their ASPM platform. Bearer Pro (cross-file and interprocedural analysis) is only available through Cycode. On the OWASP Java Benchmark, Bearer Pro scored 76% with less than 2% false positive rate.
What types of reports does Bearer generate?
Bearer generates three report types from a single scan. The security report lists vulnerabilities with severity ratings, CWE mappings, and remediation guidance. The privacy report maps how sensitive data gets collected, processed, and stored across the codebase โ€” useful for GDPR, CCPA, and DPIA audits. The data flow report provides a detailed breakdown of all detected data types and their associated components, serving as a foundation for data catalogs and compliance documentation.