Blogs

Code Security
Pentest Authorization Letter Template + Legal Requirements Explained

A pentest without proper authorization can be illegal. Learn what an authorization letter must include and how to get it right.

Code Security
Why Annual Pentesting Fails Fast-Moving Teams (And What Replaces It)

A deep technical breakdown of continuous vs annual pentesting, including attack surface drift, testing cadence, and ROI.

Code Security
Why Methodology is the Only Thing That Matters in Penetration Testing

Learn how AI penetration testing works step-by-step, from reconnaissance to exploit chains and retesting, with real methodology and examples.

Code Security
What is Penetration Testing And Why it Exists in the First Place

AI penetration testing is changing how vulnerabilities are found. Here’s a deep technical breakdown of how it works and why it matters.

AI Code Review
CodeAnt AI Ranks #1 in Security Patch Detection Benchmark

In Martian’s independent AI code review benchmark, CodeAnt ranked #1 at detecting security patch issues in pull requests. See the data and what it means for secure code review.

AI Code Review
CodeAnt AI Ranks #2 in Large Pull Request Review Benchmark

See how AI code review tools perform when analyzing large pull requests in Martian’s independent benchmark

AI Code Review
CodeAnt AI Ranks #1 in Detecting Logging Issues and PII Leaks

Which AI code review tool catches sensitive data in logs? Benchmark results reveal how tools perform in this critical category.

AI Code Review
CodeAnt AI Ranks #1 in Detecting Testing Issues in Pull Requests

Martian’s AI code review benchmark analyzed how tools detect testing issues in pull requests. CodeAnt ranked first.

AI Code Review
We Submitted CodeAnt AI to an Independent Benchmark: Here Is What Happened

Martian’s independent AI code review benchmark evaluated 17 tools across 200,000+ real pull requests. See how CodeAnt ranked and what the data reveals about modern AI code review.

Code Security
The Security Research Method: Re-Examining Old CVEs to Discover New Vulnerabilities

Learn how security researchers discover new vulnerabilities by re-examining patched CVEs and using patch diff analysis to uncover hidden exploit paths.

Code Security
How CVE 2026 28292 Enabled Remote Code Execution in simple git

Understand how CVE 2026 28292 bypassed a security control in simple git and enabled arbitrary command execution through Git’s ext protocol.

Code Security
12 Security Questions CVE-2026-28292 Forces Us to Ask About Patches, Tooling, and AI Code Review

A deep analysis of CVE 2026 28292 explaining how a regex bug bypassed security filters and what it reveals about modern code review.