Ultimate Mode
Maximum depth analysis with all 7 engines at full power. Symbolic execution, graph analysis, and AI verification for the most thorough security audit possible.
Resource Intensive
Overview
Ultimate mode is designed for comprehensive security audits where finding every possible vulnerability is more important than scan speed. It enables all analysis engines at their deepest settings.
All Engines Active
Compare what's enabled in Ultimate mode versus Advanced mode.
| Engine | Advanced | Ultimate | Details |
|---|---|---|---|
| Pattern Matching | ✓ | ✓ Extended | All 2,400+ patterns active |
| SAST Analysis | ✓ | ✓ Deep | Full AST + CFG + DFG analysis |
| Dependencies | ✓ | ✓ Transitive | Full dependency tree analysis |
| Taint Analysis | ✓ | ✓ Interprocedural | Cross-function flow tracking |
| Symbolic Execution | Limited | ✓ Full | Complete path exploration |
| Graph Analysis | Limited | ✓ Full | Code Property Graph queries |
| AI Verification | ✓ | ✓ Enhanced | Multi-model ensemble |
Deep Analysis Features
Path Explosion Handling
Advanced techniques to explore complex control flow without timeout
Cross-File Analysis
Track vulnerabilities across module boundaries and imports
Constraint Solving
Z3 solver integration for precise exploitability analysis
Memory Models
Accurate heap/stack modeling for buffer overflow detection
Symbolic Execution
Ultimate mode enables full symbolic execution, which explores all possible execution paths through your code to find vulnerabilities that only manifest under specific conditions.
Symbolic Execution Settings
Graph Analysis
The Code Property Graph (CPG) combines AST, control flow, and data flow into a unified queryable graph structure for complex vulnerability patterns.
Use Cases
Ultimate mode is ideal for these scenarios:
Pre-Release Security Audits
Run ultimate scans before major releases to catch complex vulnerabilities that faster scans might miss.
bloodhound scan . --mode ultimate --report audit-v2.0.pdfSmart Contract Audits
Blockchain code requires exhaustive analysis due to the irreversible nature of deployed contracts.
bloodhound scan contracts/ --mode ultimate --blockchain ethereumCompliance Certification
Generate evidence for SOC 2, PCI-DSS, or other compliance certifications with comprehensive analysis proof.
bloodhound scan . --mode ultimate --compliance pci-dss --evidence-packIncident Response
After a security incident, run ultimate mode to find similar vulnerabilities and understand the full attack surface.
bloodhound scan . --mode ultimate --focus injection,auth-bypass --since 2024-01-01