Platform
Shift Left AppSec Platform
Learn More
Code Scanning

Unify security scanners in one platform that cuts through noise.

Remediation

Fix what’s easy, patch what's hard, and avoid breaking changes.

AI Code Security

Prepare for AI adoption and increase AppSec productivity.

Ecosystem
Languages & Integrations
Microsoft Defender for Cloud
GitHub Advanced Security
Use Cases
Reachability & Remediation Based SCA
AI Security Code Review
OSS Security Patches
CI/CD Security
SAST & Secrets
Container Scanning
AI Governance
SBOM & VEX
Learn
Blog
Documentation
Events
LeanAppSec
Learn by Topic
AI/ML
CI/CD Security
Compliance & SBOM
Developer Productivity
First Party Code
Open Source
SCA
Learn by Category
See All
Blog
Customer Story
Ebook / Report
Events
Solution Brief
Video
Featured resources
View All
Artifact Signing
SCA for Bazel
SCA for Python and AI Apps
Tools
TEI Calculator
Risk Explorer
Company
About
Careers
News
Partners
Achievements
SOC 2
$93M Series B
Gartner Cool Vendor
CRN Stellar Startup
Intellyx Digital Innovation Award
Recent resources
View All
CVE-2025-47949 Reveals Flaw in samlify That Opens Door to SAML Single Sign-On Bypass
Endor Labs Policies: Developer-Friendly Security Automation
CVE-2025-4641 is Critical, But Likely Unreachable
LeanAppSec
LeanAppSec
Pricing
Docs
Login
Book a Demo
Book Demo

Endor Labs Data Processing

Last updated on
August 29, 2024
Title goes here

Endor Labs Data Processing

Last updated on
August 29, 2024
Enter your email to be notified of changes to this list.

This Data Processing Addendum (“DPA”) supplements the Endor Labs Terms of Use, as applicable, and any other agreement (the “Agreement”) between Endor Labs Inc. (“Company,” “us,” “we”) and the customer entity that is a party to the Agreement (“Customer” or “you”). We may update this DPA from time to time, and we will provide reasonable notice of any such updates. Any terms not defined in this DPA shall have the meaning set forth in the Agreement.

Definitions

  1. “Affiliate” means (i) an entity of which a party directly or indirectly owns fifty percent (50%) or more of the stock or other equity interest, (ii) an entity that owns at least fifty percent (50%) or more of the stock or other equity interest of a party, or (iii) an entity which is under common control with a party by having at least fifty percent (50%) or more of the stock or other equity interest of such entity and a party owned by the same person, but such entity shall only be deemed to be an Affiliate so long as such ownership exists.
  2. “Authorized Subprocessor” means a third-party who has a need to know or otherwise access Customer’s Personal Data to enable Company to perform its obligations under this DPA or the Agreement, and who is either (1) on the List (defined in Section 4.1 of the DPA) or (2) subsequently authorized under Section 4.2 of this DPA.
  3. “Company Account Data” means personal data that relates to Company’s relationship with Customer, including the names or contact information of individuals authorized by Customer to access Customer’s account and billing information of individuals that Customer has associated with its account. Company Account Data also includes any data Company may need to collect for the purpose of managing its relationship with Customer, identity verification, or as otherwise required by applicable laws and regulations.
  4. “Company Usage Data” means Service usage data collected and processed by Company in connection with the provision of the Services, including without limitation data used to identify the source and destination of a communication, activity logs, and data used to optimize and maintain performance of the Services, and to investigate and prevent system abuse.
  5. “Data Exporter” means Customer.
  6. “Data Importer” means Company. 
  7. “Data Protection Laws” means any applicable laws and regulations in any relevant jurisdiction relating to the use or processing of Personal Data including: (i) the California Consumer Privacy Act of 2018, as amended by the California Privacy Rights Act of 2020 (“CCPA”), (ii) the General Data Protection Regulation (Regulation (EU) 2016/679) (“EU GDPR”) and the EU GDPR as it forms part of the law of England and Wales by virtue of section 3 of the European Union (Withdrawal) Act 2018 (the “UK GDPR”) (together, collectively, the “GDPR”), (iii) the Swiss Federal Act on Data Protection; (iv) the UK Data Protection Act 2018; and (v) the Privacy and Electronic Communications (EC Directive) Regulations 2003; (vi) the Virginia Consumer Data Protection Act (“VCDPA”); (vii) the Colorado Privacy Act (“CPA”); (viii) the Connecticut Data Privacy Act (“CTDPA”), and (ix) the Utah Consumer Privacy Act (“UCPA”);  in each case, as updated, amended or replaced from time to time. The terms “Data Subject”, “Personal Data”, “Personal Data Breach”, “processing”, “processor,” “controller,” and “supervisory authority” shall have the meanings set forth in the GDPR.  
  8. “Data Privacy Framework” means, as applicable, EU-U.S. Data Privacy Framework, the UK Extension to the EU-U.S. Data Privacy Framework, and/or the Swiss-U.S. Data Privacy Framework.  
  9. “EU SCCs” means, as applicable, the standard contractual clauses approved by the European Commission in Commission Decision 2021/914 dated 4 June 2021, for transfers of personal data to countries not otherwise recognized as offering an adequate level of protection for personal data by the European Commission (as amended and updated from time to time), as modified by Section 6.2 of this DPA. 
  10. 1.10.“ex-EEA Transfer” means the transfer of Personal Data, which is processed in accordance with the GDPR, from the Data Exporter to the Data Importer (or its premises) outside the European Economic
    Area (the “EEA”), and such transfer is not governed by an adequacy decision made by the European Commission in accordance with the relevant provisions of the GDPR. 
  11. 1.11. “ex-UK Transfer” means the transfer of Personal Data covered by Chapter V of the UK GDPR, which is processed in accordance with the UK GDPR and the Data Protection Act 2018, from the Data Exporter to the Data Importer (or its premises) outside the United Kingdom (the “UK”), and such transfer is not governed by an adequacy decision made by the Secretary of State in accordance with the relevant provisions of the UK GDPR and the Data Protection Act 2018. 
  12. “Services” shall have the meaning set forth in the Agreement.
  13. “Standard Contractual Clauses” means the EU SCCs and the UK SCCs.   
  14. “UK Addendum” has the meaning set forth in Exhibit D. 
  15. “UK SCCs” means the EU SCCs, as amended by the UK Addendum.

Relationship of the Parties; Processing of Data

  1. The parties acknowledge and agree that with regard to the processing of Personal Data, Customer may act either as a controller or processor and, except as expressly set forth in this DPA or the Agreement, Company is a processor. Customer shall, in its use of the Services, at all times process Personal Data, and provide instructions for the processing of Personal Data, in compliance with Data Protection Laws. Customer shall ensure that the processing of Personal Data in accordance with Customer’s instructions will not cause Company to be in breach of the Data Protection Laws.  Customer is solely responsible for the accuracy, quality, and legality of (i) the Personal Data provided to Company by or on behalf of Customer, (ii) the means by which Customer acquired any such Personal Data, and (iii) the instructions it provides to Company regarding the processing of such Personal Data. Customer shall not provide or make available to Company any Personal Data in violation of the Agreement or otherwise inappropriate for the nature of the Services, and shall indemnify Company from all claims and losses in connection therewith. 
  2. Company shall not process Personal Data (i) for purposes other than those set forth in the Agreement and/or Exhibit A, (ii) in a manner inconsistent with the terms and conditions set forth in this DPA or any other documented instructions provided by Customer, including with regard to transfers of personal data to a third country or an international organization, unless required to do so by Supervisory Authority to which the Company is subject; in such a case, the Company shall inform the Customer of that legal requirement before processing, unless that law prohibits such information on important grounds of public interest, or (iii) in violation of Data Protection Laws.  Customer hereby instructs Company to process Personal Data in accordance with the foregoing and as part of any processing initiated by Customer in its use of the Services.
  3. The subject matter, nature, purpose, and duration of this processing, as well as the types of Personal Data collected and categories of Data Subjects, are described in Exhibit A to this DPA.
  4. Following completion of the Services, at Customer’s choice, Company shall return or delete Customer’s Personal Data, unless further storage of such Personal Data is required or authorized by applicable law. If return or destruction is impracticable or prohibited by law, rule or regulation, Company shall take measures to block such Personal Data from any further processing (except to the extent necessary for its continued hosting or processing required by law, rule or regulation) and shall continue to appropriately protect the Personal Data remaining in its possession, custody, or control. If Customer and Company have entered into Standard Contractual Clauses as described in Section 6 (Transfers of Personal Data), the parties agree that the certification of deletion of Personal Data that is described in  Clause 8.1(d) and Clause 8.5 of the EU SCCs (as applicable) shall be provided by Company to Customer only upon Customer’s request. 
  5. [State Privacy Law Language]. The Parties acknowledge and agree that the processing of personal information or personal data that is subject to the CCPA, VCDPA, CPA, CTDPA, or UCPA shall be carried out in accordance with the terms set forth in Exhibit E.

Authorized Subprocessors

  1. Customer acknowledges and agrees that Company may (1) engage its Affiliates and the Authorized Subprocessors listed in Exhibit B to this DPA to access and process Personal Data in connection with the Services and (2) from time to time engage additional third parties for the purpose of providing the Services, including without limitation the processing of Personal Data. By way of this DPA, Customer provides general written authorization to Company to engage subprocessors as necessary to perform the Services.
  2. A list of Company’s current Authorized Subprocessors can be found at https://www.endorlabs.com/legal/sub-processors (the “List”). The List may be updated by Company from time to time in accordance with this Section 4.  Company may provide a mechanism to subscribe to notifications of new Authorized Subprocessors and Customer agrees to subscribe to such notifications where available.  At least ten (10) days before enabling any third party other than existing Authorized Subprocessors to access or participate in the processing of Personal Data, Company will add such third party to the List and notify Customers subscribed to list notifications via email. Customer may object to such an engagement by informing Company within ten (10) days of receipt of the aforementioned notice by Customer, provided such objection is in writing and based on reasonable grounds relating to data protection. Customer acknowledges that certain subprocessors are essential to providing the Services and that objecting to the use of a subprocessor may prevent Company from offering the Services to Customer.
  3. If Customer reasonably objects to an engagement in accordance with Section 4.2, and Company cannot provide a commercially reasonable alternative within a reasonable period of time, Customer may discontinue the use of the affected Service by providing written notice to Company.  Discontinuation shall not relieve Customer of any fees owed to Company under the Agreement. 
  4. If Customer does not object to the engagement of a third party in accordance with Section 4.2 within ten (10) days of notice by Company, that third party will be deemed an Authorized Subprocessor for the purposes of this DPA.
  5. Company will enter into a written agreement with the Authorized Subprocessor imposing on the Authorized Subprocessor data protection obligations comparable to those imposed on Company under this DPA with respect to the protection of Personal Data.  In case an Authorized Subprocessor fails to fulfill its data protection obligations under such written agreement with Company, Company will remain liable to Customer for the performance of the Authorized Subprocessor’s obligations under such agreement.
  6. If Customer and Company have entered into Standard Contractual Clauses as described in Section 6 (Transfers of Personal Data), (i) the above authorizations will constitute Customer’s prior written consent to the subcontracting by Company of the processing of Personal Data if such consent is required under the Standard Contractual Clauses, and (ii) the parties agree that the copies of the agreements with Authorized Subprocessors that must be provided by Company to Customer pursuant to Clause 9(c) of the EU SCCs may have commercial information, or information unrelated to the Standard Contractual Clauses or their equivalent, removed by the Company beforehand, and that such copies will be provided by the Company only upon request by Customer.

Security of Personal Data

Taking into account the state of the art, the costs of implementation and the nature, scope, context and purposes of processing as well as the risk of varying likelihood and severity for the rights and freedoms of natural persons, Company shall maintain appropriate technical and organizational measures to ensure a level of security appropriate to the risk of processing Personal Data. Exhibit C sets forth additional information about Company’s technical and organizational security measures.

Transfers of Personal Data

  1. The parties agree that Company may transfer Personal Data processed under this DPA outside the EEA, the UK, or Switzerland as necessary to provide the Services. Customer acknowledges that Company’s primary processing operations take place in the United States, and that the transfer of Customer’s Personal Data to the United States is necessary for the provision of the Services to Customer. If Company transfers Personal Data protected under this DPA to a jurisdiction for which the European Commission has not issued an adequacy decision, Company will ensure that appropriate safeguards have been implemented for the transfer of Personal Data in accordance with Data Protection Laws.
  2. Ex-EEA Transfers. The parties agree that ex-EEA Transfers will be made (i) pursuant to the Data Privacy Framework, or (ii) if the Data Privacy Framework does not apply, pursuant to the EU SCCs, which are deemed entered into (and incorporated into this DPA by this reference) and completed as follows:some text
    1. Module One (Controller to Controller) of the EU SCCs apply when Company is processing Personal Data as a controller pursuant to Section 9 of this DPA.  
    2. Module Two (Controller to Processor) of the EU SCCs apply when Customer is a controller and Company is processing Personal Data for Customer as a processor pursuant to Section 2 of this DPA.
    3. Module Three (Processor to Subprocessor) of the EU SCCs apply when Customer is a processor and Company is processing Personal Data on behalf of Customer as a subprocessor.
  3. For each module, where applicable the following applies: some text
    1. The optional docking clause in Clause 7 does not apply; 
    2. In Clause 9, Option 2 (general written authorization) applies, and the minimum time period for prior notice of subprocessor changes shall be as set forth in Section 4.2 of this DPA; 
    3. In Clause 11, the optional language does not apply; 
    4. All square brackets in Clause 13 are hereby removed; 
    5. In Clause 17 (Option 1), the EU SCCs will be governed by Irish law; 
    6. In Clause 18(b), disputes will be resolved before the courts of Ireland;  
    7. Exhibit B to this DPA contains the information required in Annex I and Annex III of the EU SCCs; 
    8. Exhibit C to this DPA contains the information required in Annex II of the EU SCCs; and 
    9. By entering into this DPA, the parties are deemed to have signed the EU SCCs incorporated herein, including their Annexes. 
  4. Ex-UK Transfers. The parties agree that ex-UK Transfers will be made (i) pursuant to the Data Privacy Framework, or (ii) if the Data Privacy Framework does not apply, pursuant to the UK SCCs, which are deemed entered into and incorporated into this DPA by reference, and amended and completed in accordance with the UK Addendum, which is incorporated herein as Exhibit D of this DPA. 
  5. Transfers from Switzerland. The parties agree that transfers from Switzerland will be made (i) pursuant to the Data Privacy Framework, or (ii) if the Data Privacy Framework does not apply, pursuant to the EU SCCs with the following modifications: some text
    1. The terms “General Data Protection Regulation” or “Regulation (EU) 2016/679” as utilized in the EU SCCs shall be interpreted to include the Federal Act on Data Protection of 19 June 1992 (the “FADP,” and as revised as of 25 September 2020, the “Revised FADP”) with respect to data transfers subject to the FADP.
    2. The terms of the EU SCCs shall be interpreted to protect the data of legal entities until the effective date of the Revised FADP. 
    3. Clause 13 of the EU SCCs is modified to provide that the Federal Data Protection and Information Commissioner (“FDPIC”) of Switzerland shall have authority over data transfers governed by the FADP and the appropriate EU supervisory authority shall have authority over data transfers governed by the GDPR. Subject to the foregoing, all other requirements of Section 13 shall be observed. 
    4. The term “EU Member State” as utilized in the EU SCCs shall not be interpreted in such a way as to exclude Data Subjects in Switzerland from exercising their rights in their place of habitual residence in accordance with Clause 18(c) of the EU SCCs. 
  6. Supplementary Measures. In respect of any ex-EEA Transfer or ex-UK Transfer made pursuant to the Standard Contractual Clauses, the following supplementary measures shall apply:some text
    1. As of the date of this DPA, the Data Importer has not received any formal legal requests from any government intelligence or security service/agencies in the country to which the Personal Data is being exported, for access to (or for copies of) Customer’s Personal Data (“Government Agency Requests”);  
    2. If, after the date of this DPA, the Data Importer receives any Government Agency Requests, Company shall attempt to redirect the law enforcement or government agency to request that data directly from Customer. As part of this effort, Company may provide Customer’s basic contact information to the government agency. If compelled to disclose Customer’s Personal Data to a law enforcement or government agency, Company shall give Customer reasonable notice of the demand and cooperate to allow Customer to seek a protective order or other appropriate remedy unless Company is legally prohibited from doing so. Company shall not voluntarily disclose Personal Data to any law enforcement or government agency. Data Exporter and Data Importer shall (as soon as reasonably practicable) discuss and determine whether all or any transfers of Personal Data pursuant to this DPA should be suspended in the light of the such Government Agency Requests;
    3. The Data Exporter and Data Importer will meet regularly to consider whether:some text
      1. the protection afforded by the laws of the country of the Data Importer to data subjects whose Personal Data is being transferred is sufficient to provide broadly equivalent protection to that afforded in the EEA or the UK, whichever the case may be;
      2. additional measures are reasonably necessary to enable the transfer to be compliant with the Data Protection Laws; and 
      3. it is still appropriate for Personal Data to be transferred to the relevant Data Importer, taking into account all relevant information available to the parties, together with guidance provided by the supervisory authorities. 
    4. If Data Protection Laws require the Data Exporter to execute the Standard Contractual Clauses applicable to a particular transfer of Personal Data to a Data Importer as a separate agreement, the Data Importer shall, on request of the Data Exporter, promptly execute such Standard Contractual Clauses incorporating such amendments as may reasonably be required by the Data Exporter to reflect the applicable appendices and annexes, the details of the transfer and the requirements of the relevant Data Protection Laws. 
    5. If either (i) any of the means of legitimizing transfers of Personal Data outside of the EEA or UK set forth in this DPA cease to be valid or (ii) any supervisory authority requires transfers of Personal Data pursuant to those means to be suspended, then Data Importer may by notice to the Data Exporter, with effect from the date set out in such notice, amend or put in place alternative arrangements in respect of such transfers, as required by Data Protection Laws.

Rights of Data Subjects

  1. Company shall, to the extent permitted by law, notify Customer upon receipt of a request by a Data Subject to exercise the Data Subject’s right of: access, rectification, erasure, data portability, restriction or cessation of processing, withdrawal of consent to processing, and/or objection to being subject to processing that constitutes automated decision-making (such requests individually and collectively “Data Subject Request(s)”). If Company receives a Data Subject Request in relation to Customer’s data, Company will advise the Data Subject to submit their request to Customer and Customer will be responsible for responding to such request, including, where necessary, by using the functionality of the Services. Customer is solely responsible for ensuring that Data Subject Requests for erasure, restriction or cessation of processing, or withdrawal of consent to processing of any Personal Data are communicated to Company, and, if applicable, for ensuring that a record of consent to processing is maintained with respect to each Data Subject.
  2. Company shall, at the request of the Customer, and taking into account the nature of the processing applicable to any Data Subject Request, apply appropriate technical and organizational measures to assist Customer in complying with Customer’s obligation to respond to such Data Subject Request and/or in demonstrating such compliance, where possible, provided that (i) Customer is itself unable to respond without Company’s assistance and (ii) Company is able to do so in accordance with all applicable laws, rules, and regulations. Customer shall be responsible to the extent legally permitted for any costs and expenses arising from any such assistance by Company.

Actions and Access Requests; Audits

  1. Company shall, taking into account the nature of the processing and the information available to Company, provide Customer with reasonable cooperation and assistance where necessary for Customer to comply with its obligations under the GDPR to conduct a data protection impact assessment and/or to demonstrate such compliance, provided that Customer does not otherwise have access to the relevant information. Customer shall be responsible to the extent legally permitted for any costs and expenses arising from any such assistance by Company.
  2. Company shall, taking into account the nature of the processing and the information available to Company, provide Customer with reasonable cooperation and assistance with respect to Customer’s cooperation and/or prior consultation with any Supervisory Authority, where necessary and where required by the GDPR. Customer shall be responsible to the extent legally permitted for any costs and expenses arising from any such assistance by Company.
  3. Company shall maintain records sufficient to demonstrate its compliance with its obligations under this DPA, and retain such records for a period of three (3) years after the termination of the Agreement.  Customer shall, with reasonable notice to Company, have the right to review, audit and copy such records at Company’s offices during regular business hours.
  4. Upon Customer’s written request at reasonable intervals, and subject to reasonable confidentiality controls, Company shall, either (i) make available for Customer’s review copies of certifications or reports demonstrating Company’s compliance with prevailing data security standards applicable to the processing of Customer’s Personal Data, or (ii) if the provision of reports or certifications pursuant to (i) is not reasonably sufficient under Data Protection Laws, allow Customer’s independent third party representative to conduct an audit or inspection of Company’s data security infrastructure and procedures that is sufficient to demonstrate Company’s compliance with its obligations under Data Protection Laws, provided that (a) Customer provides reasonable prior written notice of any such request for an audit and such inspection shall not be unreasonably disruptive to Company’s business; (b) such audit shall only be performed during business hours and occur no more than once per calendar year; and (c) such audit shall be restricted to data relevant to Customer. Customer shall be responsible for the costs of any such audits or inspections, including without limitation a reimbursement to Company for any time expended for on-site audits.  If Customer and Company have entered into Standard Contractual Clauses as described in Section 6 (Transfers of Personal Data), the parties agree that the audits described in Clause 8.9 of the EU SCCs shall be carried out in accordance with this Section 8.4. 
  5. Company shall immediately notify Customer if an instruction, in the Company’s opinion, infringes the Data Protection Laws or Supervisory Authority.
  6. In the event of a Personal Data Breach, Company shall, without undue delay, inform Customer of the Personal Data Breach and take such steps as Company in its sole discretion deems necessary and reasonable to remediate such violation (to the extent that remediation is within Company’s reasonable control).
  7. In the event of a Personal Data Breach, Company shall, taking into account the nature of the processing and the information available to Company, provide Customer with reasonable cooperation and assistance necessary for Customer to comply with its obligations under the GDPR with respect to notifying (i) the relevant Supervisory Authority and (ii) Data Subjects affected by such Personal Data Breach without undue delay.
  8. The obligations described in Sections 8.6 and 8.7 shall not apply in the event that a Personal Data Breach results from the actions or omissions of Customer. Company’s obligation to report or respond to a Personal Data Breach under Sections 8.6 and 8.7 will not be construed as an acknowledgement by Company of any fault or liability with respect to the Personal Data Breach.

Company’s Role as a Controller

The parties acknowledge and agree that with respect to Company Account Data and Company Usage Data, Company is an independent controller, not a joint controller with Customer. Company will process Company Account Data and Company Usage Data as a controller (i) to manage the relationship with Customer; (ii) to carry out Company’s core business operations, such as accounting, audits, tax preparation and filing and compliance purposes; (iii) to monitor, investigate, prevent and detect fraud, security incidents and other misuse of the Services, and to prevent harm to Customer; (iv) for identity verification purposes; (v) to comply with legal or regulatory obligations applicable to the processing and retention of Personal Data to which Company is subject; and (vi) as otherwise permitted under Data Protection Laws and in accordance with this DPA and the Agreement. Company may also process Company Usage Data as a controller to provide, optimize, and maintain the Services, to the extent permitted by Data Protection Laws. Any processing by the Company as a controller shall be in accordance with the Company’s privacy policy set forth at https://www.endorlabs.com/legal/privacy-policy 

Conflict

In the event of any conflict or inconsistency among the following documents, the order of precedence will be: (1) the applicable terms in the Standard Contractual Clauses; (2) the terms of this DPA; (3) the Agreement; and (4) the Company’s privacy policy. Any claims brought in connection with this DPA will be subject to the terms and conditions, including, but not limited to, the exclusions and limitations set forth in the Agreement.

Exhibit A - Details of Processing

  • Nature and Purpose of Processing:   Company will process Customer’s Personal Data as necessary to provide the Services under the Agreement, for the purposes specified in the Agreement and this DPA, and in accordance with Customer’s instructions as set forth in this DPA. The nature of processing includes, without limitation the processing of certain Personal Data by the Processor on behalf of the Controller in relation to providing Customer’s authorized users to access the Processor’s platform for the purposes of reviewing software projects submitted to the platform. 
  • Duration of Processing: Company will process Customer’s Personal Data as long as required (i) to provide the Services to Customer under the Agreement; (ii) for Company’s legitimate business needs; or (iii) by applicable law or regulation. Company Account Data and Company Usage Data will be processed and stored as set forth in Company’s privacy policy.
  • Categories of Data Subjects: Developers and other employees of Customer who are users of Company’s services or otherwise contribute to Customer’s code base.
  • Categories of Personal Data: Company processes Personal Data contained in Company Account Data, Company Usage Data, and any Personal Data provided by Customer (including any Personal Data Customer collects from its end users and processes through its use of the Services) or collected by Company in order to provide the Services or as otherwise set forth in the Agreement or this DPA. Categories of Personal Data include name, location, email address, occupation, and title.  
  • Sensitive Data or Special Categories of Data: None.

Exhibit B

The following includes the information required by Annex I and Annex III of the EU SCCs, and Table 1, Annex 1A, and Annex 1B of the UK Addendum. 

The Parties 

Data exporter(s): The Customer

  • Contact details: As designated by Customer in Customer’s Order Form.
  • Signature and date: By entering into the Agreement, Data Exporter is deemed to have signed these Standard Contractual Clauses incorporated herein, as of the Effective Date of the Agreement.
  • Role (controller/processor): The Data Exporter’s role is set forth in Section 2 of this DPA.

Data importer(s): Endor Labs Inc. 

  • Address: 444 High St. Suite 300, Palo Alto, CA 94301
  • Varun Badhwar, CEO. support@endor.ai  
  • Signature and date: By entering into the Agreement, Data Importer is deemed to have signed these Standard Contractual Clauses incorporated herein, as of the Effective Date of the Agreement.
  • Role (controller/processor): The Data Importer’s role is set forth in Section 2 of this Addendum.

Description of the Transfer

Competent Supervisory Authority 

The supervisory authority shall be the supervisory authority of the Data Exporter, as determined in accordance with Clause 13 of the EU SCCs. The supervisory authority for the purposes of the UK Addendum shall be the UK Information Commissioner’s Officer.

Exhibit C - Description of the Technical and Organisational Security Measures implemented by the Data Importer

The following includes the information required by Annex II of the EU SCCs and Annex II of the UK Addendum. 

A description of the Company’s technical and organizational security measures can be found here: https://trust.endorlabs.com/. 

Exhibit D - UK Addendum 

International Data Transfer Addendum to the EU Commission Standard Contractual Clauses

Entering into this UK Addendum:

  1. Each party agrees to be bound by the terms and conditions set out in this UK Addendum, in exchange for the other party also agreeing to be bound by this UK Addendum.
  2. Although Annex 1A and Clause 7 of the Approved EU SCCs require signature by the Parties, for the purpose of making ex-UK Transfers, the Parties may enter into this UK Addendum in any way that makes them legally binding on the Parties and allows data subjects to enforce their rights as set out in this UK Addendum. Entering into this UK Addendum will have the same effect as signing the Approved EU SCCs and any part of the Approved EU SCCs.

Interpretation of this UK Addendum

  1. Where this UK Addendum uses terms that are defined in the Approved EU SCCs those terms shall have the same meaning as in the Approved EU SCCs. In addition, the following terms have the following meanings:

4. The UK Addendum must always be interpreted in a manner that is consistent with UK Data Protection Laws and so that it fulfils the Parties’ obligation to provide the Appropriate Safeguards. 

5. If the provisions included in the UK Addendum amend the Approved EU SCCs in any way which is not permitted under the Approved EU SCCs or the Approved UK Addendum, such amendment(s) will not be incorporated in the UK Addendum and the equivalent provision of the Approved EU SCCs will take their place.

6. If there is any inconsistency or conflict between UK Data Protection Laws and the UK Addendum, UK Data Protection Laws applies.

7. If the meaning of the UK Addendum is unclear or there is more than one meaning, the meaning which most closely aligns with UK Data Protection Laws applies.

8. Any references to legislation (or specific provisions of legislation) means that legislation (or specific provision) as it may change over time. This includes where that legislation (or specific provision) has been consolidated, re-enacted and/or replaced after the UK Addendum has been entered into.

Hierarchy

9. Although Clause 5 of the Approved EU SCCs sets out that the Approved EU SCCs prevail over all related agreements between the parties, the parties agree that, for ex-UK Transfers, the hierarchy in Section 10 below will prevail.

10. Where there is any inconsistency or conflict between the Approved UK Addendum and the EU SCCs (as applicable), the Approved UK Addendum overrides the EU SCCs, except where (and in so far as) the inconsistent or conflicting terms of the EU SCCs provides greater protection for data subjects, in which case those terms will override the Approved UK Addendum. 

11. Where this UK Addendum incorporates EU SCCs which have been entered into to protect ex-EU Transfers subject to the GDPR, then the parties acknowledge that nothing in the UK Addendum impacts those EU SCCs.

Incorporation and Changes to the EU SCCs:

12. This UK Addendum incorporates the EU SCCs which are amended to the extent necessary so that:some text

12a. together they operate for data transfers made by the data exporter to the data importer, to the extent that UK Data Protection Laws apply to the data exporter’s processing when making that data transfer, and they provide Appropriate Safeguards for those data transfers;

12b. Sections 9 to 11 above override Clause 5 (Hierarchy) of the EU SCCs; and

12c. the UK Addendum (including the EU SCCs incorporated into it) is (1) governed by the laws of England and Wales and (2) any dispute arising from it is resolved by the courts of England and Wales. 

13. Unless the parties have agreed alternative amendments which meet the requirements of Section 12 of this UK Addendum, the provisions of Section 15 of this UK Addendum will apply.

14. No amendments to the Approved EU SCCs other than to meet the requirements of Section 12 of this UK Addendum may be made.

15. The following amendments to the EU SCCs (for the purpose of Section 12 of this UK Addendum) are made: 

15a. References to the “Clauses” means this UK Addendum, incorporating the EU SCCs;

15b. In Clause 2, delete the words: “and, with respect to data transfers from controllers to processors and/or processors to processors, standard contractual clauses pursuant to Article 28(7) of Regulation (EU) 2016/679”,

15c. Clause 6 (Description of the transfer(s)) is replaced with: “The details of the transfers(s) and in particular the categories of personal data that are transferred and the purpose(s) for which they are transferred) are those specified in Annex I.B where UK Data Protection Laws apply to the data exporter’s processing when making that transfer.”;

15d. Clause 8.7(i) of Module 1 is replaced with: “it is to a country benefitting from adequacy regulations pursuant to Section 17A of the UK GDPR that covers the onward transfer”;

15e. Clause 8.8(i) of Modules 2 and 3 is replaced with: “the onward transfer is to a country benefitting from adequacy regulations pursuant to Section 17A of the UK GDPR that covers the onward transfer;”

15f. References to “Regulation (EU) 2016/679”, “Regulation (EU) 2016/679 of the European Parliament and of the Council of 27 April 2016 on the protection of natural persons with regard to the processing of personal data and on the free movement of such data (General Data Protection Regulation)” and “that Regulation” are all replaced by “UK Data Protection Laws”. References to specific Article(s) of “Regulation (EU) 2016/679” are replaced with the equivalent Article or Section of UK Data Protection Laws;

15g. References to Regulation (EU) 2018/1725 are removed;

15h. References to the “European Union”, “Union”, “EU”, “EU Member State”, “Member State” and “EU or Member State” are all replaced with the “UK”;

15i. The reference to “Clause 12(c)(i)” at Clause 10(b)(i) of Module one, is replaced with “Clause 11(c)(i)”;

15j. Clause 13(a) and Part C of Annex I are not used; 

15k. The “competent supervisory authority” and “supervisory authority” are both replaced with the “Information Commissioner”;

15l. In Clause 16(e), subsection (i) is replaced with: “the Secretary of State makes regulations pursuant to Section 17A of the Data Protection Act 2018 that cover the transfer of personal data to which these clauses apply;”; 

15m. Clause 17 is replaced with: “These Clauses are governed by the laws of England and Wales.”;

15n. Clause 18 is replaced with: “Any dispute arising from these Clauses shall be resolved by the courts of England and Wales. A data subject may also bring legal proceedings against the data exporter and/or data importer before the courts of any country in the UK. The parties agree to submit themselves to the jurisdiction of such courts.”; and

15o. The footnotes to the Approved EU SCCs do not form part of the UK Addendum, except for footnotes 8, 9, 10 and 11. 

Endor Labs logo
HomePricingContact Us
Company
AboutCareers
Login
LEARN
BlogDocumentationeBook / ReportsEventsLeanAppSecSolution BriefVideo
Tools
TEI CalculatorRisk Explorer
Why Us?
vs. Snykvs. Traditional SCAvs. Runtime SCA
Product
Products
Endor Labs Supply Chain
Endor Open Source
Endor CI/CD
Endor SBOM Hub
Use Cases
Code ScanningCode Scanning
SAST & Secret DetectionSAST & Secret Detection
AI Code GovernanceAI Code Governance
Upgrades & RemediationUpgrades & Remediation
SBOM IngestionSBOM Ingestion
AI AppsAI Apps
Bazel MonoreposBazel Monorepos
Digital Operational Resilience Act (DORA)Digital Operational Resilience Act (DORA)
PCI DSSPCI DSS
Container ScanningContainer Scanning
RSPMRSPM
GitHub ActionsGitHub Actions
CI/CD DiscoveryCI/CD Discovery
Artifact SigningArtifact Signing
Compliance & SBOMCompliance & SBOM
SCA with ReachabilitySCA with Reachability
Integrations
Microsoft Defender for CloudMicrosoft Defender for Cloud
RustRust
BitbucketBitbucket
VantaVanta
BazelBazel
GitHubGitHub
PHPPHP
SwiftSwift
ScalaScala
.NET (C#).NET (C#)
RubyRuby
TypeScriptTypeScript
JavaScriptJavaScript
PythonPython
GoGo
KotlinKotlin
JavaJava
SlackSlack
JenkinsJenkins
CircleCICircleCI
GitLabGitLab
JiraJira
IDEIDE
GitHubGitHub
© 2025 Endor Labs. All rights reserved.
Legal and PrivacyTrust and Security

All names, logos, and brands of third parties listed on our site are trademarks of their respective owners. Endor Labs and its products and services are not endorsed by, sponsored by, or affiliated with these third parties. Our use of these names, logos, and brands is for identification purposes only, and does not imply any such endorsement, sponsorship, or affiliation.

Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
Article

CVE-2025-47949 Reveals Flaw in samlify That Opens Door to SAML Single Sign-On Bypass

Information on the likelihood and impact of CVE-2025-47949

Click to read

Article

Endor Labs Policies: Developer-Friendly Security Automation

This whitepaper talks about how Endor Labs uses context-aware security policies, like finding, action, exception, and remediation policies, to reduce noise, improve remediation speed, and help developers focus on real risks.

Click to read

Article

CVE-2025-4641 is Critical, But Likely Unreachable

Critical CVE-2025-4641 in WebDriverManager likely poses low real-world risk, but it should still be on radar. Here’s what you need to know, plus quick steps to check versions, upgrade, and secure CI pipelines.

Click to read

Article

Mastering Security Automation: Exception and Remediation Policies

Learn how Endor Labs cuts through security noise, stops unnecessary build breaks, and keeps developers focused on real risks—making security policy automation truly developer-friendly.

Click to read

Article

5 Tips for Managing Bazel Dependencies (Without Losing Friends)

Upgrading dependencies in a Bazel monorepo? Learn 5 tips to avoid breakages, reduce risk, and keep your team (and builds) running smoothly.

Click to read

Article

Why Security Policies Frustrate Developers (and How We Can Fix Them)

Most security policies create more problems than they solve, overwhelming developers with noise and unnecessary build breaks. Here's what a better approach looks like.

Click to read

Article

Open Source Gets Political: What The easyjson Debate Misses (and what to do about it)

A look at the easyjson controversy, open source provenance, and how Go's built-in protections help teams manage risk without overreacting.

Click to read

Article

Why We Raised a $93M Series B (In This Market)

Endor Labs raised a $93M Series B to accelerate its mission of securing the AI-driven software era. Learn why top investors preempted the round—and how Endor is redefining AppSec for modern development.

Click to read

Article

Secure AI-Generated Code at the Source

This solution brief shows how application security teams can fix risks from AI-generated code earlier in development and become the catalyst for secure, scalable adoption of AI coding tools like GitHub Copilot and Cursor in their organizations.

Click to read

Article

AI Security Code Review: A Multi-Agent Approach for Detecting Security Design Flaws at Scale

This whitepaper introduces how AI Security Code Review works, what it detects, how it integrates into your workflows, and why it represents the next generation of code scanning technology — built for the complexity and speed of AI-native software development.

Click to read

Article

Introducing the Endor Labs MCP Server: fix-first security for the vibe coding era

Endor Labs MCP Server powers real security fixes for vibe coding and AI-generated code—reduce noise and help AI tools fix risks for you.

Click to read

Article

Introducing AI Security Code Review

Endor Labs helps application security teams identify the few code changes that impact their security architecture across thousands of pull requests.

Click to read

Article

Meet the application security platform built for the AI era

The era of vibe coding is here. Learn how Endor Labs is helping AppSec teams secure and fix AI-generated code with a new agentic AI platform.

Click to read

Article

Critical RCE Vulnerability in Apache Parquet (CVE-2025-30065) – Advisory and Analysis

Endor Labs advisory: Critical CVE-2025-30065 in Apache Parquet lets attackers run code via schema parsing. Patch now by upgrading to version 1.15.1.

Click to read

Article

OWASP OSS Risk 2: Compromise of Legitimate Package

OWASP OSS Risk 2: Explore the compromise of legitimate open-source packages, with an in-depth case study of the tj-actions/changed-files GitHub Action supply chain attack.

Click to read

Article

Blast Radius of the tj-actions/changed-files Supply Chain Attack

Analysis of the tj-actions/changed-files GitHub Actions compromise, assessing the impact and damage from the attack.

Click to read

Article

What You Need to Know About UK Cyber Essentials Certification

Cyber Essentials helps UK businesses guard against internet-based attacks and prove their security measures are truly effective.

Click to read

Article

GitHub Action tj-actions/changed-files supply chain attack: what you need to know

GitHub Action tj-actions/changed-files was compromised, exposing CI/CD secrets. Learn how this attack impacts repositories and what steps to take now.

Click to read

Article

Application Security Posture Management (ASPM) Explained

Learn when application security posture management (ASPM) solutions work, their limitations, and alternatives for cutting through security alert noise.

Click to read

Article

How Endor Patches Are Built and Tested

Endor Patches are backported open-source security fixes. Learn how we build and test Endor Patches for compatibility and security.

Click to read

Article

The AppSec Maturity Staircase: Climbing Faster, Not Harder with Endor Labs

Each stage of the application security maturity staircase evolves your program—and Endor Labs is your escalator to the top.

Click to read

Article

How to Get Developers to Accept Security PRs Faster

Improve your mean time to remediation (MTTR) with smarter automatic pull requests that use upgrade impact analysis to reduce alert fatigue for developers.

Click to read

Article

DeepSeek R1: What Security Teams Need to Know

Learn how to evaluate security risk factors for DeepSeek R1, and about important considerations for working with open source AI models.

Click to read

Article

How to Discover Open Source AI Models in Your Code

Use Endor Labs to discover, evaluate, and enforce policies governing the usage of open source AI models from Hugging Face in your applications.

Click to read

Article

Remote Code Execution Vulnerabilities in Apache Struts

CVE-2024-53677 and CVE-2023-50164 are vulnerabilities in Apache Struts that could pave the way for remote code execution, or RCE. Learn how to figure out if you’re affected, and if so what to do about it

Click to read

Article

Everything You Need to Know About Opengrep

Opengrep is a fork of Semgrep's open source static code analysis engine. Learn about the benefits and how you can contribute.

Click to read

Article

Uncover Trends and Show AppSec Value with the Endor Labs Dashboard

Vulnerability metrics can help you uncover remediation and SLA trends, and demonstrate the value of AppSec investments to your leadership.

Click to read

Article

Identifying and Tracking FedRAMP False Positives

False positives can make FedRAMP ConMon costly. Learn why it’s hard to accurately identify false positives and some tactics for making this process less challenging.

Click to read

Article

How Endor Labs Prioritizes Open Source Security Patches

Learn how Endor Labs targets the critical dependencies that are responsible for most of the open source vulnerabilities in the software supply chain.

Click to read

Article

Why Reachability Analysis for JavaScript Is Hard (and How We Fixed It)

JavaScript reachability is tricky for SCA tools because of how JavaScript approaches dependency resolution, dependency imports, and functions.

Click to read

Article

Endor Patches Whitepaper

When upgrading is too risky, complex, or time consuming due to regressions, breaking changes, or new bugs, you can use Endor Patches to stay safe now while still meeting your SLA requirements.

Click to read

Article

Grip Security Reduces Noise by 99%

Grip Security replaced their traditional SCA tool with Endor Labs to improve their ability to build trust with customers without taxing developers.

Click to read

Article

Grip Security Builds Customer Trust with AppSec

Grip Security values strong application security because it helps them build trust with their customers. Learn how a security company approaches AppSec.

Click to read

Article

The Uncomfortable Truth of Vulnerable and Outdated Software Components

Learn where common industry sayings such as “stay up to date” come from and how you can help Endor Labs help you overcome those challenges.

Click to read

Article

Reduce FedRAMP Compliance Costs

Endor Labs reduces false positives and prioritizes real vulnerabilities, helping your team meet FedRAMP requirements with less stress and lower costs.

Click to read

Article

Why OVAL Feeds Outperform NVD for Linux Vulnerability Management

Learn why OVAL feeds, curated by Linux distributions, offer more precise vulnerability data than the NVD, reducing container scanning false positives and wasted efforts.

Click to read

Article

Achieving FedRAMP’s Container Scanning Requirements

Click to read

Article

Breaking Changes, Breaking Trust

Breaking Changes, Breaking Trust

Click to read

Article

Reducing FedRAMP Compliance Costs with Endor Labs

Vulnerability Management for FedRAMP compliance is expensive; your SCA tool should help you make it cheaper and easier.

Click to read

Article

Microsoft Defender for Cloud Natively Integrates with Endor Labs

Integrate Microsoft Defender for Cloud with Endor Labs for reachability analysis and attack path visibility — available natively within the Defender for Cloud console. Prioritize what to fix without switching tools.

Click to read

Article

Hugging Face Model Score Curation at Endor Labs

Understand how models are factored and scored at Endor Labs, new exploration tab for HuggingFace models

Click to read

Article

Endor Labs Announces Integrated SAST Offerings

Endor Labs now integrates Static Application Security Testing (SAST) into your application security testing stack.

Click to read

Article

Understanding the Cyber Resilience Act

The Cyber Resilience Act (CRA) sets mandatory security requirements for hardware and software. This blog covers key compliance objectives, challenges with OSS vulnerabilities, and best practices for maintaining security throughout the product life cycle.

Click to read

Article

Start Clean With AI: Select Safer LLM Models with Endor Labs

You can now use Endor Labs to evaluate AI models on HuggingFace for security, popularity, quality, and activity.

Click to read

Article

The U.S. Government Prioritizes Open Source Governance and Security

The U.S. Federal government's FY 2026 Cybersecurity Priorities focus on securing open source software, improving governance, and supporting OSS sustainability to strengthen the software supply chain.

Click to read

Article

Understanding the Basics of Large Language Models (LLMs)

Understand what LLMs are, how foundational LLMs are built, the opportunities they offer and the risks they pose.

Click to read

Article

Container Layer Analysis: Clarity in Remediation

Container layer analysis tells you which layer contains a vulnerability so you can prioritize remediation efforts more effectively and meet SLAs like FedRAMP.

Click to read

Article

Endor Labs Achieves 92% Reduction in SCA Alerts

Endor Labs reduces open-source vulnerability noise by 92%, boosting productivity and improving collaboration between development and security teams.

Click to read

Article

Karl Mattson Joins Endor Labs as Chief Information Security Officer

We're thrilled to have Karl Mattson as Endor Labs first Chief Information Security Officer (CISO)!

Click to read

Article

Highlights from Our 2024 Dependency Management Webinar

Get key insights from the 2024 Dependency Management webinar with Darren Meyer and Henrik Plate. We discuss how to prioritize vulnerabilities, navigate breaking changes, and leverage public vulnerability databases effectively.

Click to read

Article

Relativity Blocks Risks with Endor Labs

Relativity changed their security program from a blocker to an enabler by integrating security into developer workflows and empowering developers to prevent risks before they ship to production.

Click to read

Article

Blocking with Confidence: Relativity's Dev Experience Journey

Relativity changed their security program from a blocker to an enabler by integrating security into developer workflows and empowering developers to prevent risks before they ship to production.

Click to read

Article

48 most popular open source tools for Python applications, scored

Discover the top open-source tools for Python applications, ranked by Endor Scores based on security, activity, popularity, and code quality.

Click to read

Article

FedRAMP Requirements for Vulnerability Management and Dependency Upgrades

This blog covers key steps to simplify FedRAMP vulnerability management, helping you reduce risks and meet compliance timelines. It also provides practical tips to empower developers and streamline fixes for a smoother FedRAMP process.

Click to read

Article

Fix Vulnerabilities Faster with Auto Patching and Endor Patches

Automatically patch open source libraries with Endor Patches during the build process, ensuring software is continuously protected against vulnerabilities without manual intervention.

Click to read

Article

Dependency Management Report

Click to read

Article

Announcing the 2024 Dependency Management Report

Our third-annual Dependency Management Report explores how emerging trends in open source security should guide SDLC security strategy.

Click to read

Article

Starburst Gets 98.3% Noise Reduction with Endor Labs

Starburst, an open data lakehouse, replaced Rezillion with Endor Labs for SCA. They improved their ability to identify and prioritize open source while complementing the developer experience.

Click to read

Article

Building a DevSecOps Practice at Starburst

Wondering how to build or revamp a DevSecOps program? Get some immediately useful tips that you can apply to your startup or mature enterprise…or anywhere in between.

Click to read

Article

What is CI/CD Security and What Tools Do You Need to Do it?

Learn what CI/CD security is, why it’s important, and discover the key tools Endor Labs offers to help you secure your CI/CD pipelines.

Click to read

Article

PWN Request Threat: A Hidden Danger in GitHub Actions

Endor Labs provides comprehensive CI/CD security for GitHub action workflows that detect patterns that may indicate PWN request threats.

Click to read

Article

Address Open Source Risks with Endor Labs

Click to read

Article

Endor Labs Brand Guidelines

Click to read

Article

Give Devs the Confidence to Fix: Making Remediation Less Painful

Endor Labs’ newest capabilities help you reduce the research required to understand the impact of dependency upgrades and Endor Magic Patches help you stay safe without changing versions.

Click to read

Article

Endor Labs Partners with Microsoft to Strengthen Software Supply Chains

Endor Labs is now available on Azure Marketplace!

Click to read

Article

Prioritize Open Source Risks with Endor Labs

Endor Labs provides several filters to help you prioritize which risks to address first, resulting in an average 92% noise reduction.

Click to read

Article

Discover Open Source Risks with Endor Labs

Use Endor Labs to get accurate dependency inventories and complete vulnerability data sources.

Click to read

Article

48 most popular open source tools for npm applications, scored

Discover the 48 most popular open-source npm tools, complete with Endor Scores, to help you choose the best dependencies for your projects based on security, activity, popularity, and code quality.

Click to read

Article

Benchmarking Endor Labs vs. Snyk’s GitHub Apps

Compare Endor Labs and Snyk GitHub Apps.

Click to read

Article

Using Artifact Signing to Establish Provenance for SLSA

Use artifact signing, a feature of Endor Labs, to support build provenance requirements for SLSA.

Click to read

Article

Fixed is Better than Found | Upgrades & Remediation with Endor Labs

At Endor Labs, we believe your application security tooling must go beyond alerting—it should also helpyou fast-track remediation.

Click to read

Article

How to Fix Vulnerabilities Without Breaking Changes

Click to read

Article

Introducing Upgrades & Remediation: Give Developers the Confidence to Fix

Upgrade Impact Analysis shows you what breaking changes a fix could cause. Endor Patches are trusted patches you can use when upgrades are too painful.

Click to read

Article

Static SCA vs. Dynamic SCA: Which is Better (and Why It's Neither)

Software composition analysis (SCA) tools can take a static or dynamic approach. Learn the pros and cons of each option and see how the results differ.

Click to read

Article

33 Most Popular Open Source Tools for Maven Applications, Scored

Explore the top 33 open source tools for Maven, scored by Endor Labs on security, activity, popularity, and code quality.

Click to read

Article

Endor Labs Partner Program Overview

Click to read

Article

Jellyfish Enables Data-Driven AppSec with Endor Labs

Jellyfish replaced Snyk with Endor Labs to improve their ability to identify, prioritize, address, and predict open source risk. Learn more!

Click to read

Article

Jellyfish’s Data-Driven Security Program

Learn how Jellyfish’s security team uses a data-driven approach to risk management and the role SCA plays in their strategy.

Click to read

Article

What's a Security Pipeline? - On-Demand Webinar

Learn about common patterns and tradeoffs for security pipelines in this introductory webinar.

Click to read

Article

Secure Everything Your Code Depends On With Endor Labs

While conventional code security tools drown teams in false positives, Endor Labs zeroes in on real risks, empowering developers without without slowing them down.

Click to read

Article

Endor Labs Receives Strategic Investment from Citi Ventures

Endor Labs, a leader in software supply chain security, today announced a strategic investment from Citi Ventures.

Click to read

Article

We made the Inc. Best Workplaces List for 2024!

Endor Labs is named to Inc.’s annual Best Workplaces list for 2024.

Click to read

Article

New CocoaPods CVEs: Swift and Objective-C Supply Chains Are Fragile

Three CocoaPods CVEs raise serious security concerns for consumers of Swift and Objective-C libraries used for macOS and iOS mobile development.

Click to read

Article

Questions to Ask Your Software Composition Analysis Vendor

When choosing an SCA tool, you’ll need to understand how the tool generates an inventory, correlates to risks, helps you prioritize results, and integrates into your toolchain.

Click to read

Article

Backstage and Endor Labs: AppSec in a Dev’s Dream Workspace

The Endor Labs plugins for Backstage create an application security experience that doesn’t require developers to leave Backstage.

Click to read

Article

Managing Open Source Vulnerabilities for PCI DSS Compliance - On-Demand Webinar

Watch this 30-minute on-demand webinar to learn about changes to PCI DSS that impact OSS vulnerability management.

Click to read

Article

Container Scanning + SCA = Better Together

We’re excited to announce that Endor Labs now extends our software supply chain platform to include container scanning.

Click to read

Article

Endor Labs Named to Rising in Cyber by CISOs and Venture Capital Investors

Company Recognized for Creating Secure Supply Chains that Improve Application Development Productivity

Click to read

Article

Evaluating and Scoring OSS Packages

How can you tell if an OSS package is “good” or “bad”? A rigorous evaluation model, such as the Endor Score, can help developers make quick and informed decisions.

Click to read

Article

Demystifying Transitive Dependency Vulnerabilities

95% of vulnerabilities are found in transitive dependencies. Learn how they’re unique from direct dependencies and how to incorporate them into your risk management program.

Click to read

Article

Surprise! Your GitHub Actions Are Dependencies, Too

GitHub Actions are open source dependencies - secure them accordingly! Learn how to effectively manage the security risks associated with GitHub Actions with a proactive approach focusing on three key areas: visibility, hardening, and dependency management.

Click to read

Article

OSS Vulnerabilities and the Digital Operational Resilience Act (DORA)

Learn how your organization can achieve DORA compliance for managing open source software vulnerabilities with reachability-based SCA, SBOMs, and more.

Click to read

Article

Protect Mobile Apps with Kotlin and Swift SCA

Learn about the mobile application threat landscape and how you can protect mobile apps from security and legal risk associated with open source software with Endor Labs Open Source.

Click to read

Article

Endor Labs Partners with GuidePoint Security to Secure The Software Supply Chain

Click to read

Article

Intro to Endor Labs - On-Demand Webinar

Watch this 30-minute on-demand webinar to learn how to Endor Labs supports a Software Supply Chain Security program.

Click to read

Article

OWASP OSS Risk 1: Known Vulnerabilities

Known vulnerabilities are a well-understood software risk…but managing and prioritizing them is anything but simple. Learn about key considerations when building a program to detect and remediate CVEs.

Click to read

Article

Low-Code/No Code Artifact Signing

A low-code/no code artifact signing solution makes it easy to implement an enterprise solution for verifying authenticity of software artifacts and tracing their origins.

Click to read

Article

An Auditor’s Perspective on Addressing OSS Vulnerabilities for PCI DSS v4

Learn how your organization can achieve PCI DSS v4 compliance for managing open source software vulnerabilities with reachability-based SCA and more.

Click to read

Article

Your Git Repo is a Supply Chain Risk

Source code repository misconfigurations can expose your organization to supply chain attacks. Repository Security Posture Management (RSPM) can offer a reliable system to enforce best practices.

Click to read

Article

Guide to Implementing Software Supply Chain Security

In this free guide, experts answer key questions like "what is it?", "why is it important?", "and how do I secure it?" so you can make informed decisions and thoughtfully design your organization's SSCS program.

Click to read

Next
Event

Lightsaber Stunt Training Series - North America

Lightsaber Stunt Training Series - North America

Click to view

Event

Lightsaber Stunt Training Series - Europe

Lightsaber Stunt Training Series - Europe

Click to view

Event

OWASP Jacksonville Meetup

OWASP Vancouver Meetup

Click to view

Event

AppSec Brews and Rooftop Views Social

BBQ & Bytes: AppSec Social Copenhagen

Click to view

Event

OWASP Global AppSec EU 2025

OWASP Global AppSec EU 2025

Click to view

Event

CSA San Francisco Chapter May Meetup

CSA San Francisco Chapter May Meetup

Click to view

Event

OWASP Washington, D.C. Meetup

OWASP Washington, D.C. Meetup Evolving Your AppSec Program in the Era of AI

Click to view

Event

The Crossroad of Agentic AI and Security: Chicago Edition

The Crossroad of Agentic AI and Security: Chicago Edition

Click to view

Event

FS-ISAC EMEA Summit

FS-ISAC EMEA Summit

Click to view

Event

Cloud & AI Security Azure Immersion Day

Join us at Cloud & AI Security Azure Immersion Day!

Click to view

Event

OWASP London Meetup

OWASP London Meetup

Click to view

Event

OWASP Vancouver Meetup

OWASP Vancouver Meetup

Click to view

Event

BBQ & Bytes: AppSec Social Copenhagen

BBQ & Bytes: AppSec Social Copenhagen

Click to view

Event

V2 Security Copenhagen

V2 Security Copenhagen

Click to view

Event

Birds of a Feather [Women's Only Event]

Click to view

Event

CISO Sanctuary Breakfast hosted by Hitch Partners

Click to view

Event

Bricks, Blocks, and Big Ideas: A LEGO Workshop with Tyler Clites

Click to view

Event

Request your VIP pass to the Endor Labs' Base at RSAC

Click to view

Event

CSA Summit 2025

CSA Summit 2025: Transformation: Ushering in the Next Generation of Cybersecurity.

Click to view

Event

AI vs. AI: Securing Software in the Era of AI-Generated Code

AI vs. AI: Securing Software in the Era of AI-Generated Code

Click to view

Event

RSAC 2025

Click to view

Event

AppSec Workshop: Fix Faster

AppSec Workshop: Fix Faster

Click to view

Event

Vibe Coding is Mid for Security

Learn what securing AI-generated code actually looks like. Endor Labs CTO Dimitri Stiliadis will do some vibe coding of his own, and then scan and fix vulnerabilities live.

Click to view

Event

Cybersecurity Identity Summit 2025

Cybersecurity Identity Summit

Click to view

Event

BSides Seattle

BSides Seattle

Click to view

Event

KCJUG Meetup

KCJUG Meetup

Click to view

Event

OWASP Antonio Meetup

OWASP Antonio Meetup AI for AppSec - A discussion of AppSec Best Practices

Click to view

Event

Innovate Cybersecurity Summit - Nashville

Innovate Cybersecurity Summit - Nashville

Click to view

Event

AppSec AI Summit

AppSec AI Summit

Click to view

Event

OWASP Bristol: Stormy Seas of Supply Chain Security

OWASP Bristol: Stormy Seas of Supply Chain Security

Click to view

Event

NCAA March Madness

NCAA March Madness

Click to view

Event

OWASP Vancouver

OWASP Vancouver

Click to view

Event

Boston Security March 2025 Meetup

Boston Security March 2025 Meetup

Click to view

Event

GPSec Security Forum Boston

GPSec Security Forum Boston

Click to view

Event

InfoSec Anti-Summit

InfoSec Anti-Summit

Click to view

Event

SANS Institute Cyber Solutions Fest

SANS Institute Cyber Solutions Fest

Click to view

Event

SnowFROC

SnowFROC

Click to view

Event

DevOps Live London

DevOps Live London

Click to view

Event

FS-ISAC Spring Americas Summit

FS-ISAC Spring Americas Summit

Click to view

Event

Lightsaber Stunt Training for AppSec Nerds

Meet other AppSec practitioners, learn some stage combat lightsaber moves from a legit stunt choreographer, and enjoy snacks and drinks on us.

Click to view

Event

Software Supply Chain (SSC) Security & Craft Beer

Software Supply Chain (SSC) Security & Craft Beer

Click to view

Event

Innovate Peer Panel - Atlanta

Innovate Peer Panel - Atlanta

Click to view

Event

GuidePoint Security CKO

GuidePoint Security CKO

Click to view

Event

Chicago Java Users Group Meetup

Chicago Java Users Group Meetup

Click to view

Event

NDC Security

NDC Security

Click to view

Event

Lightsaber Stunt Training for AppSec Nerds

Meet other AppSec practitioners, learn some stage combat lightsaber moves from a legit stunt choreographer, and enjoy snacks and drinks on us.

Click to view

Event

Black Hat Europe 2024

Black Hat Europe 2024

Click to view

Event

OWASP Birmingham December Meeting

OWASP Birmingham

Click to view

Event

OWASP BeNeLux Days

OWASP BeNeLux Days

Click to view

Event

C-Vision National CIO & CISO Summit

C-Vision National CIO & CISO Summit

Click to view

Event

GitHub Universe

GitHub Universe

Click to view

Event

FS-ISAC Fall Americas Summit 2024

Register Today!

Click to view

Event

LASCON 2024

Register Today!

Click to view

Event

OWASP New York Meetup

OWASP NY Meetup

Click to view

Event

SINET New York 2024

SINET New York 2024

Click to view

Event

Lightsaber Stage Combat Training for AppSec Nerds - New York

Lightsaber Stage Combat Training for AppSec Nerds - New York

Click to view

Event

CISO XC

CISO XC

Click to view

Event

Innovate Cybersecurity Summit, Scottsdale

Innovate Cybersecurity Summit, Scottsdale

Click to view

Event

Information Warfare Summit

Information Warfare Summit

Click to view

Event

OWASP MSP October Meetup

OWASP MSP October Meetup

Click to view

Event

OWASP 2024 Global AppSec, SF

Meet Endor Labs at OWASP Global AppSec SF

Click to view

Event

Dependency Management Report 2024

The Dependency Management Report explores emerging OSS dependency trends to consider as part of an SDLC security strategy.

Click to view

Event

Nordic Software Security Summit

Request a Meeting

Click to view

Event

Bay Area Bazel Meet-up

Bay Area Bazel Meet-up

Click to view

Event

OWASP Tampa Chapter 2024 Q3 Lunch and Learn

OWASP Tampa Chapter 2024 Q3 Lunch and Learn

Click to view

Event

Mastering OSS Security: Validating Vulnerabilities with Code-Level Reachability Analysis

Join this 45-minute webinar to learn how to prioritize OSS vulnerabilities using code-level reachability analysis, call graphs, and other parameters for effective vulnerability management

Click to view

Event

Give Devs the Confidence to Fix: Making Remediation Less Painful

Join this 60-minute webinar to learn how you can reduce the research required to understand the impact of dependency upgrades.

Click to view

Event

Black Hat - Las Vegas, USA 2024

Meet Endor Labs at Black Hat - Las Vegas, USA 2024

Click to view

Event

CSA San Francisco July Chapter Meetup

CSA - San Francisco Chapter Meetup

Click to view

Event

What's a Security Pipeline?

Join this 30-minute webinar to learn about common patterns and tradeoffs for security pipelines.

Click to view

Event

Happy Hour at OWASP Global 2024 AppSec

Endor Labs Happy Hour at OWASP Global 2024 AppSec

Click to view

Event

OWASP - LA Monthly Meet-up In-Person, June 2024

Meet Endor Labs at OWASP - Los Angeles, Monthly Meet-up

Click to view

Event

Meet Endor Labs at Evanta New York CISO Executive Summit

Register today!

Click to view

Event

OWASP 2024 Global AppSec, Lisbon 2024

Meet Endor Labs at OWASP Global AppSec Lisbon

Click to view

Event

London Java Community Summer Unconference 2024

Schedule a Meeting

Click to view

Event

OWASP Amsterdam, Netherlands - June 2024 Chapter Meetup

Join us for a conversation on harnessing reachability analysis to discern real threats.

Click to view

Event

Managing Open Source Vulnerabilities for PCI DSS Compliance

Click to view

Event

OWASP AppSec Days Pacific Northwest Conference - 2024

Register Today!

Click to view

Event

Engineering Leader Mixer

An interactive event for engineering leaders to network and get ideas for how to ship secure code

Click to view

Event

OWASP Porto, Portugal - May 2024 Chapter Meetup

Join us for a conversation on harnessing reachability analysis to discern real threats.

Click to view

Event

OWASP Lisboa - May 2024 Chapter Meetup

Join us for a conversation on harnessing reachability analysis to discern real threats.

Click to view

Event

Security Executive Round Table & Dinner in Hartford

Join us at a restaurant in Hartford, CT for executive round table and dinner

Click to view

Event

GuidePoint Security Cup at Geneva National Resort 2024

Register today!

Click to view

Event

Software Supply Chain Summit: Bridging Theory and Practice

Register today!

Click to view

Event

Meet Endor Labs at FS-ISAC EMEA

Register today!

Click to view

Event

PyCon US 2024

We will be at the PyCon Main Conference from May 17 to May 19

Click to view

Event

OWASP Northern Virginia - May 2024 Chapter Meetup

Join us for a conversation on managing open source vulnerabilities for PCI DSS compliance.

Click to view

Event

OWASP Portland - May 2024 Chapter Meetup

Join us for a conversation on managing open source vulnerabilities for PCI DSS compliance.

Click to view

Event

Intro to Endor Labs

Learn how Endor Labs supports a software supply chain security program, from OSS code to pipelines to compliance.

Click to view

Event

Join Endor Labs and GitHub for a Directors' Breakfast at RSA

Please join Endor Labs & GitHub on May 7th for an interactive executive breakfast focused on navigating the software supply chain security landscape without taxing developers.

Click to view

Event

Join Endor Labs and GitHub for an Executive Breakfast at RSA

Please join Endor Labs & GitHub on May 7th for an interactive executive breakfast focused on navigating the software supply chain security landscape without taxing developers.

Click to view

Event

Escape the RSA Chaos with Endor Labs and GitHub at the AppSec Lounge

Join Endor Labs and GitHub to refuel and refresh at TRACE before heading back to the Moscone Center to enjoy RSAC.

Click to view

Event

Meet Endor Labs at Day of Shecurity

Register today!

Click to view

Event

ISC2 Worcester 2024 | What's in Your AI Code

Join us as we speak about 'What's in your AI code?' at ISC2 Chapter Eastern Massachusetts

Click to view

Event

2nd Annual NFL Draft Party

Register for a great tech talk featuring Karthik Swarnam (ArmorCode), Karl Mattson (Noname Security) & Chris Hughes (Endor Labs) to discuss current trends in application security & vulnerability management.

Click to view

Event

Supply Chain Cyber Security Summit 2024

Join us for the Panel Discussion on Boosting Software Supply Chain Maturity to the Next Level with SBOM

Click to view

Event

Let's Taco 'bout Cyber

Join us at Barrio in Chicago for networking, gourmet tacos, and a discussion on how CISOs respond to securing AI initiatives.

Click to view

Event

Meet Endor Labs at Devnexus 2024

Join us at Devnexus, a largest Java Ecosystem Conference as we uncover the open source security for Java apps.

Click to view

Event

Artifact Signing 101

Join Endor Labs for a webinar on how to use artifact signing to enable code traceability, admission control, and provenance. Register now.

Click to view

Event

Meet Endor Labs at SnowFroc

Click to view

Product

Endor Open Source

Automate OSS selection and approval, identify applicable risks, reduce SCA noise by 92%, and remediate issues faster.

Click to view

Product

Endor SBOM Hub

Centralize your SBOM management with Endor SBOM Hub, featuring comprehensive risk analysis and continuous monitoring capabilities.

Click to view

Product

Endor CI/CD

Optimize your CI/CD pipelines with Endor Labs for superior code security, complete build integrity verification, and robust repository protection.

Click to view

Use case

Code Scanning

Endor Labs brings together Reachability-Based SCA, SAST, Secrets, CI/CD, and Container Scanning in a single, remediation-focused platform. Go beyond detection—correlating findings across scanners and cutting through the noise with reachability and deep program analysis.

Click to read

Use case

SAST & Secret Detection

Consolidate SAST, SCA, Container Scanning, and Secret Detection into a single platform with Endor Labs.

Click to read

Use case

AI Code Governance

Evaluate open source packages and AI Models for security, popularity, quality and activity.

Click to read

Use case

SCA with Reachability

Target the most critical vulnerabilities in your OSS packages for better code health and security.

Click to read

Use case

Container Scanning

Reduce noise by consolidating SCA and containers.

Click to read

Use case

Compliance & SBOM

Centrally manage SBOMs and VEX for compliance, including legal and licensing integrity.

Click to read

Use case

Upgrades & Remediation

Fix what’s easy, and magically patch hard-to-upgrade packages

Click to read

Use case

Artifact Signing

Enable application provenance for admission control, incident response, and compliance.

Click to read

Use case

AI Apps

SCA for Python-based AI applications

Click to read

Use case

Bazel Monorepos

SCA for Bazel including native Bazel rules for Java, Python, and Golang.

Click to read

Use case

Digital Operational Resilience Act (DORA)

Achieve DORA compliance for managing open source software vulnerabilities.

Click to read

Use case

PCI DSS

Achieve PCI DSS v4 compliance for managing open source software vulnerabilities.

Click to read

Use case

SBOM Ingestion

A one-stop-shop to store, manage, and analyze SBOMs with continuous risk monitoring.

Click to read

Use case

RSPM

Enforce source code best practices with Repository Security Posture Management.

Click to read

Use case

GitHub Actions

Prevent pipeline attacks caused by vulnerabilities and malware in CI workflows.

Click to read

Use case

CI/CD Discovery

Establish automated controls to reveal what’s running in your pipelines.

Click to read

Sorry, we couldn't find what you're looking for.
View All Results