Learn

Learn about software supply chain security and Endor Labs.

Featured resources

Beyond Mythos: A CISO's Guide to Building an Effective Software Security Program for the AI Era
Ebook/Report

Beyond Mythos: A CISO's Guide to Building an Effective Software Security Program for the AI Era

Apr 29, 2026
Claude Opus 4.7 Sets New Records in the Endor Labs Agent Security League
Blog

Claude Opus 4.7 Sets New Records in the Endor Labs Agent Security League

Apr 17, 2026
Surge in submissions forces NIST to change how it handles CVEs. Here's what it means for vulnerability management.
Blog

Surge in submissions forces NIST to change how it handles CVEs. Here's what it means for vulnerability management.

Apr 17, 2026
Agent Security League: Evaluating the Security of AI-Coded Software
Ebook/Report

Agent Security League: Evaluating the Security of AI-Coded Software

Apr 15, 2026
Topic
Medium
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
Security
The Missing Layer: Why Container OS Libraries Need Reachability Analysis
Blog

The Missing Layer: Why Container OS Libraries Need Reachability Analysis

Feb 13, 2026
No items found.
Introducing Full Stack Reachability: Container Scanning That Actually Reduces Noise
Blog

Introducing Full Stack Reachability: Container Scanning That Actually Reduces Noise

Feb 11, 2026
No items found.
AI SAST in Action: Finding Real Vulnerabilities in OpenClaw
Blog

AI SAST in Action: Finding Real Vulnerabilities in OpenClaw

Feb 10, 2026
No items found.
Context Engineering for Application Security Whitepaper
Ebook/Report

Context Engineering for Application Security

Feb 10, 2026
AI/ML
First Party Code
Design Flaws in AI Generated Code
Blog

Design Flaws in AI Generated Code

Feb 9, 2026
AI/ML
Security
The Architectural Shift Behind the AI SDLC
Blog

The Architectural Shift Behind the AI SDLC

Feb 6, 2026
AI/ML
Test-First Prompting: Using TDD for Secure AI-Generated Code
Blog

Test-First Prompting: Using TDD for Secure AI-Generated Code

Feb 4, 2026
Security
News
Open Source
Blog

CVE-2026-25049 Expression Escape Vulnerability Leading to RCE in n8n

Feb 4, 2026
First Party Code
Static Analysis in the Age of AI, Part I: AI Coding Assistants
Blog

Static Analysis in the Age of AI, Part I: AI Coding Assistants

Feb 3, 2026
Developer Productivity
DevSecOps Tools
7 Snyk Alternatives for Engineering Teams in 2026
Blog

7 Snyk Alternatives for Engineering Teams in 2026

Feb 2, 2026
Malware
Open Source
Security
Blog

npm Account Takeovers are a Growing Malware Trend

Jan 29, 2026
Open Source
Security
SCA
Blog

CVE-2026-22709: Critical Sandbox Escape in vm2 Enables Arbitrary Code Execution

Jan 27, 2026
Open Source
Security
Classic Vulnerabilities Meet AI Infrastructure: Why MCP Needs AppSec
Blog

Classic Vulnerabilities Meet AI Infrastructure: Why MCP Needs AppSec

Jan 23, 2026
Security
Open Source
How Fake Font Packages Abused npm as a CDN
Blog

How Fake Font Packages Abused npm as a CDN

Jan 23, 2026
AI/ML
First Party Code
Your Next Breach Won’t Be a CVE: Connecting Real Incidents to AI-Aware Code Review
Blog

Your Next Breach Won’t Be a CVE: Connecting Real Incidents to AI-Aware Code Review

Jan 21, 2026
Customer Stories
SCA
Tech
Compliance & SBOM
Astronomer uses Endor Labs for SCA, malware detection, and container scanning.
Customer Story

Astronomer Modernizes AppSec with Endor Labs

Jan 20, 2026
Open Source
Security
Decorative icon
Blog

Eight for One: Multiple Vulnerabilities Fixed in the Node.js Runtime

Jan 13, 2026
Security
Malware
Open Source
Blog

n8mare on auth street: supply chain attack targets n8n ecosystem

Jan 9, 2026
Open Source
Security
CVE-2025-12543: Host Header Validation Bypass in Undertow
Blog

CVE-2025-12543: Host Header Validation Bypass in Undertow

Jan 9, 2026
Security
Open Source
CVE-2025-68428
Blog

CVE-2025-68428: Critical Path Traversal in jsPDF

Jan 6, 2026
AI/ML
Malware
Open Source
Security
Endor Labs integrates with Cursor hooks to detect malicious packages before AI agents install dependencies, preventing supply chain attacks at the moment of risk.
Blog

Bringing Malware Detection Into AI Coding Workflows with Cursor Hooks

Dec 17, 2025

Want to stay in the loop?

Sign up for our newsletter.