Introducing AI SAST That Thinks Like a Security Engineer
Learn More
Product
Platform
Platform Overview
Code Scanning
AI for AppSec
Remediation
Use cases
Reachability-based SCA
AI Model Governance
AI-Native SAST
SBOM & Compliance
AI Security Code Review
Security Patches
Secrets Detection
Container Security
Malware Detection
Ecosystem
Languages & Integrations
Microsoft Defender for Cloud
GitHub Advanced Security
Learn
Resources
Blog
Events
Customer Stories
Ebooks & Reports
Solution Brief
Videos
LeanAppSec
Documentation
Tools
Code Prompt Library
New
TEI Calculator
Risk Explorer
Featured resources
State of Dependency Management 2025
Code Prompt Library
Artifact Signing
SCA for Bazel
SCA for Python and AI Apps
Company
About
About Us
Careers
Partners
News
Achievements
SOC 2
$93M Series B
Gartner Cool Vendor
CRN Stellar Startup
Intellyx Digital Innovation Award
See How It Works in Action
Book a Demo
Customers
LeanAppSec
Pricing
Docs
Login
Book a Demo
Book Demo
Introducing AI SAST That Thinks Like a Security Engineer
Learn More
Product
Platform
Platform Overview
Code Scanning
AI for AppSec
Remediation
Use cases
Reachability-based SCA
AI Model Governance
AI-Native SAST
SBOM & Compliance
AI Security Code Review
Security Patches
Secrets Detection
Container Security
Malware Detection
Ecosystem
Languages & Integrations
Microsoft Defender for Cloud
GitHub Advanced Security
Learn
Resources
Blog
Events
Customer Stories
Ebooks & Reports
Solution Brief
Videos
LeanAppSec
Documentation
Tools
Code Prompt Library
New
TEI Calculator
Risk Explorer
Featured resources
State of Dependency Management 2025
Code Prompt Library
Artifact Signing
SCA for Bazel
SCA for Python and AI Apps
Company
About
About Us
Careers
Partners
News
Achievements
SOC 2
$93M Series B
Gartner Cool Vendor
CRN Stellar Startup
Intellyx Digital Innovation Award
See How It Works in Action
Book a Demo
Customers
LeanAppSec
Pricing
Docs
Login
Book a Demo
Book Demo
Learn
Learn about software supply chain security and Endor Labs.
Featured resources
Blog
Classic Vulnerabilities Meet AI Infrastructure: Why MCP Needs AppSec
Jan 23, 2026
Blog
How Fake Font Packages Abused npm as a CDN
Jan 23, 2026
Blog
Understanding NPM Worms and the Shai-Hulud Attack
Nov 25, 2025
Blog
StackHawk + Endor Labs: Correlating SAST and DAST Alerts
Nov 20, 2025
Show filters
Topic
AI/ML
CI/CD
Compliance & SBOM
Developer Productivity
First Party Code
Malware
News
Open Source
Opinion
SCA
Security
Tech
Medium
Blog
Customer Story
Ebook/Report
Solution Brief
Video
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
Security
Blog
What are Maven Dependency Scopes and Their Related Security Risks?
Nov 29, 2022
Security
Compliance & SBOM
Open Source
Blog
The Government's Role in Maintaining Open Source Security
Nov 21, 2022
SCA
Security
Blog
Introduction to Program Analysis
Nov 17, 2022
News
Blog
More Than 30 Industry-Leading CISOs Personally Invest in Endor Labs
Nov 9, 2022
News
SCA
Blog
From Cloud Security to Code Security: Why We've Raised $25M to Take on OSS Dependency Sprawl
Oct 11, 2022
News
Open Source
Blog
Endor Labs Launches with $25M Seed Financing to Tackle Massive Sprawl of Open Source Software (OSS)
Oct 10, 2022
Security
Compliance & SBOM
Blog
SBOMs are Just a Means to an End
Sep 13, 2022
Security
Open Source
Blog
Introducing the OpenSSF Scorecard API
Sep 8, 2022
Developer Productivity
Blog
How to Get the Most out of GitHub API Rate Limits
Aug 21, 2022
News
Opinion
Blog
Why I Joined Endor Labs to Build our India Team
Aug 2, 2022
Opinion
Security
Open Source
Blog
How Zero Trust Principles Can Accelerate Enterprise Adoption of OSS
Jul 25, 2022
Security
Tech
Blog
What Security Teams Need to Know about Software Development
Jul 14, 2022
Opinion
Security
Blog
CSRB Log4j Report - The Response is as Dangerous as the Vulnerability
Jul 14, 2022
Security
Developer Productivity
Opinion
Blog
Polyrepo vs. Monorepo - How Does it Impact Dependency Management?
Jul 12, 2022
Previous
1
...
14 / 14
Want to stay in the loop?
Sign up for our newsletter.