Blog

Learn about software supply chain security and Endor Labs

SANDWORM_MODE: Dissecting a Multi-Stage npm Supply Chain Attack

SANDWORM_MODE: Dissecting a Multi-Stage npm Supply Chain Attack

SANDWORM_MODE: Dissecting a Multi-Stage npm Supply Chain Attack

CVE-2026-25896: Entity Encoding Bypass in fast-xml-parser

CVE-2026-25896: Entity Encoding Bypass in fast-xml-parser

Critical vulnerability in fast-xml-parser allows injection attacks

AI SAST Finding: Path Traversal in OpenClaw via LLM Guardrail Bypass

AI SAST Finding: Path Traversal in OpenClaw via LLM Guardrail Bypass

How Endor Labs' AI SAST engine identified a path traversal vulnerability in OpenClaw's apply_patch tool tracked as (GHSA-r5fq-947m-xm57)

Supply Chain Attack targeting Cline installs OpenClaw

Supply Chain Attack targeting Cline installs OpenClaw

A compromised release of the popular Cline CLI npm package silently installs OpenClaw globally on any machine.

How AI SAST Traced Data Flows to Uncover Six OpenClaw Vulnerabilities

How AI SAST Traced Data Flows to Uncover Six OpenClaw Vulnerabilities

We discovered six vulnerabilities in OpenClaw using Endor Labs’ AI SAST data flow analysis and validated working exploits.

The Missing Layer: Why Container OS Libraries Need Reachability Analysis

The Missing Layer: Why Container OS Libraries Need Reachability Analysis

As CVEs surge and AI speeds delivery, container OS reachability is key to reducing noise and real AppSec risk.

Introducing Full Stack Reachability: Container Scanning That Actually Reduces Noise

Introducing Full Stack Reachability: Container Scanning That Actually Reduces Noise

Cut container vulnerability noise by up to 90% with full-stack reachability analysis spanning application and container image OS layers.

AI SAST in Action: Finding Real Vulnerabilities in OpenClaw

AI SAST in Action: Finding Real Vulnerabilities in OpenClaw

How Endor Labs AI SAST identified 7 exploitable vulnerabilities in OpenClaw through accurate data flow analysis and systematic exploit validation.

Design Flaws in AI Generated Code

Design Flaws in AI Generated Code

AI coding assistants are introducing systemic architectural weaknesses that have major consequences for application security.

The Architectural Shift Behind the AI SDLC

The Architectural Shift Behind the AI SDLC

AI is reshaping software development. Learn how security can become invisible guardrails inside the AI SDLC, so teams move faster without compromising safety.

Test-First Prompting: Using TDD for Secure AI-Generated Code

Test-First Prompting: Using TDD for Secure AI-Generated Code

Use a “test-first” prompting pattern to improve AI-generated code security through test-driven development (TDD).

CVE-2026-25049 Expression Escape Vulnerability Leading to RCE in n8n

CVE-2026-25049 Expression Escape Vulnerability Leading to RCE in n8n

CVE in n8n allows unauthenticated users to achieve remote code execution (RCE) via sandbox escape.

Static Analysis in the Age of AI, Part I: AI Coding Assistants

Static Analysis in the Age of AI, Part I: AI Coding Assistants

AI coding assistants are reducing simple security flaws, but SAST tools need better context and agent integration to catch what remains.

7 Snyk Alternatives for Engineering Teams in 2026

7 Snyk Alternatives for Engineering Teams in 2026

Evaluate Snyk alternatives that solve alert fatigue and false positives while driving remediation. Compare developer-friendly AppSec platforms, open source tools, and runtime solutions.

npm Account Takeovers are a Growing Malware Trend

npm Account Takeovers are a Growing Malware Trend

Learn why this malware attack vector is a big risk for open source software consumers.

CVE-2026-22709: Critical Sandbox Escape in vm2 Enables Arbitrary Code Execution

CVE-2026-22709: Critical Sandbox Escape in vm2 Enables Arbitrary Code Execution

Classic Vulnerabilities Meet AI Infrastructure: Why MCP Needs AppSec

Classic Vulnerabilities Meet AI Infrastructure: Why MCP Needs AppSec

MCP servers inherit classical vulnerabilities like command injection, path traversal, and SSRF. Here's why LLMs and MCP deserve the same security practices as traditional applications.

How Fake Font Packages Abused npm as a CDN

How Fake Font Packages Abused npm as a CDN

101 packages disguised as font files distributed 34 TiB of data via npm's infrastructure—with a total of 4.3 PiB transferred via downloads.

Your Next Breach Won’t Be a CVE: Connecting Real Incidents to AI-Aware Code Review

Your Next Breach Won’t Be a CVE: Connecting Real Incidents to AI-Aware Code Review

Most breaches aren’t CVEs. Learn how subtle code and config changes caused real incidents, and why AI-aware code review is now critical.

Eight for One: Multiple Vulnerabilities Fixed in the Node.js Runtime

Eight for One: Multiple Vulnerabilities Fixed in the Node.js Runtime

Multiple Vulnerabilities Fixed in the Node.js Runtime

n8mare on auth street: supply chain attack targets n8n ecosystem

n8mare on auth street: supply chain attack targets n8n ecosystem

Attackers weaponized n8n's community nodes to steal credentials

CVE-2025-12543: Host Header Validation Bypass in Undertow

CVE-2025-12543: Host Header Validation Bypass in Undertow

Critical Host Header Validation Bypass in the Undertow

CVE-2025-68428: Critical Path Traversal in jsPDF

CVE-2025-68428: Critical Path Traversal in jsPDF

Critical vulnerability requires upgrade to jsPDF 4.0.0

Bringing Malware Detection Into AI Coding Workflows with Cursor Hooks

Bringing Malware Detection Into AI Coding Workflows with Cursor Hooks

Endor Labs integrates with Cursor hooks to detect malicious packages before AI agents install dependencies, preventing supply chain attacks at the moment of risk.

When Regex Isn’t Enough: How We Discovered CVE-2025-13780 in pgAdmin

When Regex Isn’t Enough: How We Discovered CVE-2025-13780 in pgAdmin

CVE-2025-13780 is a critical vulnerability in pgAdmin 4 where whitespace characters bypass regex filters, a common failure mode in input validation.

Book a Demo

Protect your open source dependencies, secrets, and CI/CD pipelines without slowing down devs.