Introducing AI SAST That Thinks Like a Security Engineer
Learn More
Product
Platform
Platform Overview
Code Scanning
AI for AppSec
Remediation
Use cases
Reachability-based SCA
AI Model Governance
AI SAST
SBOM & Compliance
AI Security Code Review
Security Patches
Secrets Detection
Container Security
Malware Detection
Ecosystem
Languages & Integrations
Microsoft Defender for Cloud
GitHub Advanced Security
Learn
Resources
Blog
Events
Customer Stories
Ebooks & Reports
Solution Brief
Videos
LeanAppSec
Documentation
Tools
Code Prompt Library
New
TEI Calculator
Risk Explorer
Self-Guided Product Tour
Featured resources
State of Dependency Management 2025
Code Prompt Library
Artifact Signing
SCA for Bazel
SCA for Python and AI Apps
Company
About
About Us
Careers
Partners
News
Achievements
SOC 2
$93M Series B
Gartner Cool Vendor
CRN Stellar Startup
Intellyx Digital Innovation Award
See How It Works in Action
Book a Demo
Customers
LeanAppSec
Pricing
Docs
Login
Book a Demo
Book Demo
Introducing AI SAST That Thinks Like a Security Engineer
Learn More
Product
Platform
Platform Overview
Code Scanning
AI for AppSec
Remediation
Use cases
Reachability-based SCA
AI Model Governance
AI SAST
SBOM & Compliance
AI Security Code Review
Security Patches
Secrets Detection
Container Security
Malware Detection
Ecosystem
Languages & Integrations
Microsoft Defender for Cloud
GitHub Advanced Security
Learn
Resources
Blog
Events
Customer Stories
Ebooks & Reports
Solution Brief
Videos
LeanAppSec
Documentation
Tools
Code Prompt Library
New
TEI Calculator
Risk Explorer
Self-Guided Product Tour
Featured resources
State of Dependency Management 2025
Code Prompt Library
Artifact Signing
SCA for Bazel
SCA for Python and AI Apps
Company
About
About Us
Careers
Partners
News
Achievements
SOC 2
$93M Series B
Gartner Cool Vendor
CRN Stellar Startup
Intellyx Digital Innovation Award
See How It Works in Action
Book a Demo
Customers
LeanAppSec
Pricing
Docs
Login
Book a Demo
Book Demo
Learn
Learn about software supply chain security and Endor Labs.
Featured resources
Blog
Introducing Full Stack Reachability: Container Scanning That Actually Reduces Noise
Feb 11, 2026
Blog
Classic Vulnerabilities Meet AI Infrastructure: Why MCP Needs AppSec
Jan 23, 2026
Blog
How Fake Font Packages Abused npm as a CDN
Jan 23, 2026
Blog
Understanding NPM Worms and the Shai-Hulud Attack
Nov 25, 2025
Show filters
Topic
AI/ML
CI/CD
Compliance & SBOM
DevSecOps Tools
Developer Productivity
First Party Code
Malware
News
Open Source
Opinion
SCA
Security
Tech
Medium
Blog
Customer Story
Ebook/Report
Solution Brief
Video
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
Security
Compliance & SBOM
Blog
SBOMs are Just a Means to an End
Sep 13, 2022
Security
Open Source
Blog
Introducing the OpenSSF Scorecard API
Sep 8, 2022
Developer Productivity
Blog
How to Get the Most out of GitHub API Rate Limits
Aug 21, 2022
News
Opinion
Blog
Why I Joined Endor Labs to Build our India Team
Aug 2, 2022
Opinion
Security
Open Source
Blog
How Zero Trust Principles Can Accelerate Enterprise Adoption of OSS
Jul 25, 2022
Security
Tech
Blog
What Security Teams Need to Know about Software Development
Jul 14, 2022
Opinion
Security
Blog
CSRB Log4j Report - The Response is as Dangerous as the Vulnerability
Jul 14, 2022
Security
Developer Productivity
Opinion
Blog
Polyrepo vs. Monorepo - How Does it Impact Dependency Management?
Jul 12, 2022
Previous
1
...
15 / 15
Want to stay in the loop?
Sign up for our newsletter.