Blog

Learn about software supply chain security and Endor Labs

When a Broken Fix Leads to RCE: How We Found CVE-2025-66626 in Argo

When a Broken Fix Leads to RCE: How We Found CVE-2025-66626 in Argo

Treating a security patch as a signal, not a conclusion, led us to discover how arbitrary file writes became remote code execution in Argo Workflows.

From Vision to Reality: How Endor Labs Delivers Developer-First Security

From Vision to Reality: How Endor Labs Delivers Developer-First Security

See how Endor Labs brings developer-friendly security to life with real demo clips. Watch how vulnerabilities are prevented, prioritized, and fixed—right inside IDEs, PRs, pipelines, and Jira.

Developer Experience: The Key to Successful Security

Developer Experience: The Key to Successful Security

AI coding tools promise speed, but hidden security burdens drain developer productivity. Learn how context-aware AppSec cuts noise, boosts velocity, and improves DX.

Critical Remote Code Execution (RCE) Vulnerabilities in React and Next.js

Critical Remote Code Execution (RCE) Vulnerabilities in React and Next.js

React and Next.js contain a critical RCE vulnerability

Understanding NPM Worms and the Shai-Hulud Attack

Understanding NPM Worms and the Shai-Hulud Attack

A breakdown of npm worms, how Shai-Hulud spread across the ecosystem, and the key security practices every team needs to prevent large-scale compromise.

Shai-Hulud 2 Malware Campaign Targets GitHub and Cloud Credentials Using Bun Runtime

Shai-Hulud 2 Malware Campaign Targets GitHub and Cloud Credentials Using Bun Runtime

Analysis of Shai-Hulud 2, a new npm supply chain attack

The OWASP Top 10 Gets Modernized

The OWASP Top 10 Gets Modernized

A look at the 2025 update to the OWASP Top 10, the most significant update since 2021

How Endor Labs Is Supporting Bryce, a Next-Gen AppSec Builder

How Endor Labs Is Supporting Bryce, a Next-Gen AppSec Builder

Endor Labs celebrates emerging AppSec talent at OWASP Global AppSec, highlighting Bryce’s Space Badge and investing in his future with a $5,000 scholarship.

StackHawk + Endor Labs: Correlating SAST and DAST Alerts

StackHawk + Endor Labs: Correlating SAST and DAST Alerts

Cut through duplicate alerts by mapping findings from static and dynamic analysis, so teams can focus on remediating the vulnerabilities that matter.

Introducing AI SAST That Thinks Like a Security Engineer

Introducing AI SAST That Thinks Like a Security Engineer

Endor Labs AI SAST detects business logic flaws and reduces false positives by up to 95% by orchestrating multiple AI agents to review code.

Code-to-Cloud Application Risk Management with Upwind and Endor Labs

Code-to-Cloud Application Risk Management with Upwind and Endor Labs

Together Endor Labs and Upwind deliver complete visibility across code and cloud for strong security posture management across the SLDC.

The Great Indonesian TEA Theft: Analyzing a NPM Spam Campaign

The Great Indonesian TEA Theft: Analyzing a NPM Spam Campaign

How a sophisticated spam campaign hijacked popular NPM packages with Indonesian food names as part of a global software supply chain attack.

Happier DOMs: The perils of running untrusted JavaScript code outside of a web browser

Happier DOMs: The perils of running untrusted JavaScript code outside of a web browser

Endor Labs reveals critical RCE flaws in Happy DOM, showing how weak JavaScript sandboxes enable prototype pollution and unsafe code execution in Node.js.

Announcing Native Support for OWASP Secure Pipeline Verification Standard

Announcing Native Support for OWASP Secure Pipeline Verification Standard

Endor Labs now offers native support for OWASP SPVS, helping teams secure every stage of the software delivery pipeline from Plan to Operate.

OWASP Top 10 Adds A03:2025: Software Supply Chain Failures

OWASP Top 10 Adds A03:2025: Software Supply Chain Failures

The 2025 update to the OWASP Top 10 for Web Applications elevated software supply chain failures to the third leading risk.

Critical SQL Injection Vulnerability in Django (CVE-2025-64459)

Critical SQL Injection Vulnerability in Django (CVE-2025-64459)

Critical SQL Injection Vulnerability in Django (CVE-2025-64459). Learn what happened, root cause, impact, and how to mitigate.

False Negatives in SAST: Hidden Risks Behind the Noise

False Negatives in SAST: Hidden Risks Behind the Noise

Traditional SAST tools miss vulnerabilities while overwhelming teams with false positives. Here's why the silent failures are more dangerous than the noise.

Why AI Code Gets Less Secure With Every Prompt

Why AI Code Gets Less Secure With Every Prompt

New research shows that AI-generated code becomes less secure with each iteration—highlighting why developers need guardrails and structured approaches.

From Shift Left to Shift Down: Making SAST Work for Developers

From Shift Left to Shift Down: Making SAST Work for Developers

Shift-left security programs are failing and SAST is partly to blame. Shifting security down, not left, is how we make it work for developers.

Why SAST Failed (And What’s Next)

Why SAST Failed (And What’s Next)

Static analysis promised scalable secure coding. Instead, it delivered false positives and fatigue. Here’s why—and what the next era of analysis must do differently.

CVE-2025-53967 Remote Code Execution in Framelink Figma MCP Server

CVE-2025-53967 Remote Code Execution in Framelink Figma MCP Server

Learn about CVE-2025-53967, a high-severity RCE vulnerability in Framelink Figma MCP, including mitigation and vetting recommendations.

Rethinking the Interface: How Agentic UX is Shaping the Future of Endor Labs

Rethinking the Interface: How Agentic UX is Shaping the Future of Endor Labs

Discover how agentic UX streamlines application security workflows with proactive automation, faster decisions, and a more intuitive experience.

Why Cooldown Windows Belong in Every npm Security Strategy

Why Cooldown Windows Belong in Every npm Security Strategy

Block risky npm releases before they spread. Endor Labs’ new cooldown policy enforces wait times to stop malware attacks.

Zero Trust for Open Source: Why Enterprises Need a New AppSec Playbook

Zero Trust for Open Source: Why Enterprises Need a New AppSec Playbook

Enterprises must extend Zero Trust security principles to open source: assume nothing is safe, verify every dependency, and enforce guardrails across the software supply chain.

It’s Time to Take Malware Seriously (Attackers Do)

It’s Time to Take Malware Seriously (Attackers Do)

Too often, malware isn’t a priority until there’s a high-profile attack. But with the recent escalation of attacks, it’s time to make malware a first-party citizen in application security programs.

Book a Demo

Protect your open source dependencies, secrets, and CI/CD pipelines without slowing down devs.