Aikido Security Unveils AI-Powered Continuous Penetration Testing Tool

March 06, 2026
Aikido Security has introduced Aikido Infinite, an AI-driven solution that continuously tests and remediates software vulnerabilities as code moves through deployment, creating what the company calls self-securing software.

Aikido Security has introduced Aikido Infinite, a continuous AI penetration testing solution that autonomously identifies, validates, and remediates vulnerabilities, announced in a press release. The company describes the platform as the first self-securing software system, designed to test every code change as it moves through deployment.

Aikido Infinite operates by triggering AI-driven agents to perform penetration testing on each software update, validating exploitability, and applying fixes within the same workflow. The system’s continuous feedback loop allows organizations to detect and address security risks in real time, rather than relying on periodic manual testing.

The platform leverages Aikido’s code-to-runtime analysis, combining insights from source code, application architecture, and runtime behavior to identify hidden vulnerabilities and logic flaws. It also builds upon the company’s previous AI pentesting product, Aikido Attack, adding automated remediation and retesting capabilities.

According to Aikido, Infinite’s autonomous model is designed to scale security operations alongside modern software delivery cycles, reducing delays between code deployment and vulnerability resolution.

We hope you enjoyed this article.

Consider subscribing to one of our newsletters like Cybersecurity AI Weekly or Daily AI Brief.

Also, consider following us on social media:

Subscribe to Cybersecurity AI Weekly

Weekly newsletter about AI in Cybersecurity.

Market report

2025 State of Data Security Report: Quantifying AI’s Impact on Data Risk

Varonis Systems, Inc.

The 2025 State of Data Security Report by Varonis analyzes the impact of AI on data security across 1,000 IT environments. It highlights critical vulnerabilities such as exposed sensitive cloud data, ghost users, and unsanctioned AI applications. The report emphasizes the need for robust data governance and security measures to mitigate AI-related risks.

Read more