Search Results

Learn about software supply chain security and Endor Labs

Search all our {count} unique resources
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
Loading the Results...
AI SAST Finding: Path Traversal in OpenClaw via LLM Guardrail Bypass
chrome_reader_mode
Article

AI SAST Finding: Path Traversal in OpenClaw via LLM Guardrail Bypass

How Endor Labs' AI SAST engine identified a path traversal vulnerability in OpenClaw's apply_patch tool tracked as (GHSA-r5fq-947m-xm57)

Supply Chain Attack targeting Cline installs OpenClaw
chrome_reader_mode
Article

Supply Chain Attack targeting Cline installs OpenClaw

A compromised release of the popular Cline CLI npm package silently installs OpenClaw globally on any machine.

How AI SAST Traced Data Flows to Uncover Six OpenClaw Vulnerabilities
chrome_reader_mode
Article

How AI SAST Traced Data Flows to Uncover Six OpenClaw Vulnerabilities

We discovered six vulnerabilities in OpenClaw using Endor Labs’ AI SAST data flow analysis and validated working exploits.

The Missing Layer: Why Container OS Libraries Need Reachability Analysis
chrome_reader_mode
Article

The Missing Layer: Why Container OS Libraries Need Reachability Analysis

As CVEs surge and AI speeds delivery, container OS reachability is key to reducing noise and real AppSec risk.

Introducing Full Stack Reachability: Container Scanning That Actually Reduces Noise
chrome_reader_mode
Article

Introducing Full Stack Reachability: Container Scanning That Actually Reduces Noise

Cut container vulnerability noise by up to 90% with full-stack reachability analysis spanning application and container image OS layers.

AI SAST in Action: Finding Real Vulnerabilities in OpenClaw
chrome_reader_mode
Article

AI SAST in Action: Finding Real Vulnerabilities in OpenClaw

How Endor Labs AI SAST identified 7 exploitable vulnerabilities in OpenClaw through accurate data flow analysis and systematic exploit validation.

Context Engineering for Application Security
chrome_reader_mode
Article

Context Engineering for Application Security

Design Flaws in AI Generated Code
chrome_reader_mode
Article

Design Flaws in AI Generated Code

AI coding assistants are introducing systemic architectural weaknesses that have major consequences for application security.

The Architectural Shift Behind the AI SDLC
chrome_reader_mode
Article

The Architectural Shift Behind the AI SDLC

AI is reshaping software development. Learn how security can become invisible guardrails inside the AI SDLC, so teams move faster without compromising safety.

Test-First Prompting: Using TDD for Secure AI-Generated Code
chrome_reader_mode
Article

Test-First Prompting: Using TDD for Secure AI-Generated Code

Use a “test-first” prompting pattern to improve AI-generated code security through test-driven development (TDD).

CVE-2026-25049 Expression Escape Vulnerability Leading to RCE in n8n
chrome_reader_mode
Article

CVE-2026-25049 Expression Escape Vulnerability Leading to RCE in n8n

CVE in n8n allows unauthenticated users to achieve remote code execution (RCE) via sandbox escape.

Static Analysis in the Age of AI, Part I: AI Coding Assistants
chrome_reader_mode
Article

Static Analysis in the Age of AI, Part I: AI Coding Assistants

AI coding assistants are reducing simple security flaws, but SAST tools need better context and agent integration to catch what remains.

7 Snyk Alternatives for Engineering Teams in 2026
chrome_reader_mode
Article

7 Snyk Alternatives for Engineering Teams in 2026

Evaluate Snyk alternatives that solve alert fatigue and false positives while driving remediation. Compare developer-friendly AppSec platforms, open source tools, and runtime solutions.

npm Account Takeovers are a Growing Malware Trend
chrome_reader_mode
Article

npm Account Takeovers are a Growing Malware Trend

Learn why this malware attack vector is a big risk for open source software consumers.

CVE-2026-22709: Critical Sandbox Escape in vm2 Enables Arbitrary Code Execution
chrome_reader_mode
Article

CVE-2026-22709: Critical Sandbox Escape in vm2 Enables Arbitrary Code Execution

Classic Vulnerabilities Meet AI Infrastructure: Why MCP Needs AppSec
chrome_reader_mode
Article

Classic Vulnerabilities Meet AI Infrastructure: Why MCP Needs AppSec

MCP servers inherit classical vulnerabilities like command injection, path traversal, and SSRF. Here's why LLMs and MCP deserve the same security practices as traditional applications.

How Fake Font Packages Abused npm as a CDN
chrome_reader_mode
Article

How Fake Font Packages Abused npm as a CDN

101 packages disguised as font files distributed 34 TiB of data via npm's infrastructure—with a total of 4.3 PiB transferred via downloads.

Your Next Breach Won’t Be a CVE: Connecting Real Incidents to AI-Aware Code Review
chrome_reader_mode
Article

Your Next Breach Won’t Be a CVE: Connecting Real Incidents to AI-Aware Code Review

Most breaches aren’t CVEs. Learn how subtle code and config changes caused real incidents, and why AI-aware code review is now critical.

Astronomer Modernizes AppSec with Endor Labs
chrome_reader_mode
Article

Astronomer Modernizes AppSec with Endor Labs

Astronomer uses Endor Labs for SCA, malware detection, and container scanning.

Eight for One: Multiple Vulnerabilities Fixed in the Node.js Runtime
chrome_reader_mode
Article

Eight for One: Multiple Vulnerabilities Fixed in the Node.js Runtime

Multiple Vulnerabilities Fixed in the Node.js Runtime

n8mare on auth street: supply chain attack targets n8n ecosystem
chrome_reader_mode
Article

n8mare on auth street: supply chain attack targets n8n ecosystem

Attackers weaponized n8n's community nodes to steal credentials

CVE-2025-12543: Host Header Validation Bypass in Undertow
chrome_reader_mode
Article

CVE-2025-12543: Host Header Validation Bypass in Undertow

Critical Host Header Validation Bypass in the Undertow

CVE-2025-68428: Critical Path Traversal in jsPDF
chrome_reader_mode
Article

CVE-2025-68428: Critical Path Traversal in jsPDF

Critical vulnerability requires upgrade to jsPDF 4.0.0

Bringing Malware Detection Into AI Coding Workflows with Cursor Hooks
chrome_reader_mode
Article

Bringing Malware Detection Into AI Coding Workflows with Cursor Hooks

Endor Labs integrates with Cursor hooks to detect malicious packages before AI agents install dependencies, preventing supply chain attacks at the moment of risk.

When Regex Isn’t Enough: How We Discovered CVE-2025-13780 in pgAdmin
chrome_reader_mode
Article

When Regex Isn’t Enough: How We Discovered CVE-2025-13780 in pgAdmin

CVE-2025-13780 is a critical vulnerability in pgAdmin 4 where whitespace characters bypass regex filters, a common failure mode in input validation.

When a Broken Fix Leads to RCE: How We Found CVE-2025-66626 in Argo
chrome_reader_mode
Article

When a Broken Fix Leads to RCE: How We Found CVE-2025-66626 in Argo

Treating a security patch as a signal, not a conclusion, led us to discover how arbitrary file writes became remote code execution in Argo Workflows.

From Vision to Reality: How Endor Labs Delivers Developer-First Security
chrome_reader_mode
Article

From Vision to Reality: How Endor Labs Delivers Developer-First Security

See how Endor Labs brings developer-friendly security to life with real demo clips. Watch how vulnerabilities are prevented, prioritized, and fixed—right inside IDEs, PRs, pipelines, and Jira.

Developer Experience: The Key to Successful Security
chrome_reader_mode
Article

Developer Experience: The Key to Successful Security

AI coding tools promise speed, but hidden security burdens drain developer productivity. Learn how context-aware AppSec cuts noise, boosts velocity, and improves DX.

Critical Remote Code Execution (RCE) Vulnerabilities in React and Next.js
chrome_reader_mode
Article

Critical Remote Code Execution (RCE) Vulnerabilities in React and Next.js

React and Next.js contain a critical RCE vulnerability

The New era of Code-to-Cloud Security
chrome_reader_mode
Article

The New era of Code-to-Cloud Security

Rubrik Hits Aggressive SLAs via Endor Labs
chrome_reader_mode
Article

Rubrik Hits Aggressive SLAs via Endor Labs

Rubrik uses Endor Labs for application security, including: SCA, SAST, container scanning, and secret detection.

Understanding NPM Worms and the Shai-Hulud Attack
chrome_reader_mode
Article

Understanding NPM Worms and the Shai-Hulud Attack

A breakdown of npm worms, how Shai-Hulud spread across the ecosystem, and the key security practices every team needs to prevent large-scale compromise.

Shai-Hulud 2 Malware Campaign Targets GitHub and Cloud Credentials Using Bun Runtime
chrome_reader_mode
Article

Shai-Hulud 2 Malware Campaign Targets GitHub and Cloud Credentials Using Bun Runtime

Analysis of Shai-Hulud 2, a new npm supply chain attack

The OWASP Top 10 Gets Modernized
chrome_reader_mode
Article

The OWASP Top 10 Gets Modernized

A look at the 2025 update to the OWASP Top 10, the most significant update since 2021

How Endor Labs Is Supporting Bryce, a Next-Gen AppSec Builder
chrome_reader_mode
Article

How Endor Labs Is Supporting Bryce, a Next-Gen AppSec Builder

Endor Labs celebrates emerging AppSec talent at OWASP Global AppSec, highlighting Bryce’s Space Badge and investing in his future with a $5,000 scholarship.

StackHawk + Endor Labs: Correlating SAST and DAST Alerts
chrome_reader_mode
Article

StackHawk + Endor Labs: Correlating SAST and DAST Alerts

Cut through duplicate alerts by mapping findings from static and dynamic analysis, so teams can focus on remediating the vulnerabilities that matter.

AI SAST: Combining Agents, Program Analysis, and Rules for High-Confidence Code Security
chrome_reader_mode
Article

AI SAST: Combining Agents, Program Analysis, and Rules for High-Confidence Code Security

This whitepaper details Endor Labs' multi-modal approach to AI SAST, leveraging agentic reasoning, program analysis, and advanced rules to eliminate 95% of false positives while surfacing complex logic flaws.

Introducing AI SAST That Thinks Like a Security Engineer
chrome_reader_mode
Article

Introducing AI SAST That Thinks Like a Security Engineer

Endor Labs AI SAST detects business logic flaws and reduces false positives by up to 95% by orchestrating multiple AI agents to review code.

Invisible Threats and the Blind Spots of Security 

chrome_reader_mode
Article

Invisible Threats and the Blind Spots of Security 


How GlassWorm Exploited Unicode Shadows in VS Code Supply Chains

Code-to-Cloud Application Risk Management with Upwind and Endor Labs
chrome_reader_mode
Article

Code-to-Cloud Application Risk Management with Upwind and Endor Labs

Together Endor Labs and Upwind deliver complete visibility across code and cloud for strong security posture management across the SLDC.

The Great Indonesian TEA Theft: Analyzing a NPM Spam Campaign
chrome_reader_mode
Article

The Great Indonesian TEA Theft: Analyzing a NPM Spam Campaign

How a sophisticated spam campaign hijacked popular NPM packages with Indonesian food names as part of a global software supply chain attack.

Happier DOMs: The perils of running untrusted JavaScript code outside of a web browser
chrome_reader_mode
Article

Happier DOMs: The perils of running untrusted JavaScript code outside of a web browser

Endor Labs reveals critical RCE flaws in Happy DOM, showing how weak JavaScript sandboxes enable prototype pollution and unsafe code execution in Node.js.

Announcing Native Support for OWASP Secure Pipeline Verification Standard
chrome_reader_mode
Article

Announcing Native Support for OWASP Secure Pipeline Verification Standard

Endor Labs now offers native support for OWASP SPVS, helping teams secure every stage of the software delivery pipeline from Plan to Operate.

OWASP Top 10 Adds A03:2025: Software Supply Chain Failures
chrome_reader_mode
Article

OWASP Top 10 Adds A03:2025: Software Supply Chain Failures

The 2025 update to the OWASP Top 10 for Web Applications elevated software supply chain failures to the third leading risk.

Critical SQL Injection Vulnerability in Django (CVE-2025-64459)
chrome_reader_mode
Article

Critical SQL Injection Vulnerability in Django (CVE-2025-64459)

Critical SQL Injection Vulnerability in Django (CVE-2025-64459). Learn what happened, root cause, impact, and how to mitigate.

False Negatives in SAST: Hidden Risks Behind the Noise
chrome_reader_mode
Article

False Negatives in SAST: Hidden Risks Behind the Noise

Traditional SAST tools miss vulnerabilities while overwhelming teams with false positives. Here's why the silent failures are more dangerous than the noise.

State of Dependency Management 2025
chrome_reader_mode
Article

State of Dependency Management 2025

AI Coding Agents and Software Supply Chain Risk

Why AI Code Gets Less Secure With Every Prompt
chrome_reader_mode
Article

Why AI Code Gets Less Secure With Every Prompt

New research shows that AI-generated code becomes less secure with each iteration—highlighting why developers need guardrails and structured approaches.

From Shift Left to Shift Down: Making SAST Work for Developers
chrome_reader_mode
Article

From Shift Left to Shift Down: Making SAST Work for Developers

Shift-left security programs are failing and SAST is partly to blame. Shifting security down, not left, is how we make it work for developers.

Why SAST Failed (And What’s Next)
chrome_reader_mode
Article

Why SAST Failed (And What’s Next)

Static analysis promised scalable secure coding. Instead, it delivered false positives and fatigue. Here’s why—and what the next era of analysis must do differently.

CVE-2025-53967 Remote Code Execution in Framelink Figma MCP Server
chrome_reader_mode
Article

CVE-2025-53967 Remote Code Execution in Framelink Figma MCP Server

Learn about CVE-2025-53967, a high-severity RCE vulnerability in Framelink Figma MCP, including mitigation and vetting recommendations.

Rethinking the Interface: How Agentic UX is Shaping the Future of Endor Labs
chrome_reader_mode
Article

Rethinking the Interface: How Agentic UX is Shaping the Future of Endor Labs

Discover how agentic UX streamlines application security workflows with proactive automation, faster decisions, and a more intuitive experience.

Proactive Protection from Malware Attacks
chrome_reader_mode
Article

Proactive Protection from Malware Attacks

Protect your software supply chain from rising malware attacks. Endor Labs blocks malicious open-source dependencies early and reduces incident response.

Why Cooldown Windows Belong in Every npm Security Strategy
chrome_reader_mode
Article

Why Cooldown Windows Belong in Every npm Security Strategy

Block risky npm releases before they spread. Endor Labs’ new cooldown policy enforces wait times to stop malware attacks.

Zero Trust for Open Source: Why Enterprises Need a New AppSec Playbook
chrome_reader_mode
Article

Zero Trust for Open Source: Why Enterprises Need a New AppSec Playbook

Enterprises must extend Zero Trust security principles to open source: assume nothing is safe, verify every dependency, and enforce guardrails across the software supply chain.

It’s Time to Take Malware Seriously (Attackers Do)
chrome_reader_mode
Article

It’s Time to Take Malware Seriously (Attackers Do)

Too often, malware isn’t a priority until there’s a high-profile attack. But with the recent escalation of attacks, it’s time to make malware a first-party citizen in application security programs.

Fireside Chat: Building an AppSec Program for Cursor
chrome_reader_mode
Article

Fireside Chat: Building an AppSec Program for Cursor

Learn how Travis McPeak is building an AppSec program that's both effective and non-disruptive to the engineering team's workflow.

A Practical Guide to AI and Application Security
chrome_reader_mode
Article

A Practical Guide to AI and Application Security

As AI reshapes software development, security teams can be the catalyst for unlocking productivity without sacrificing safety.

How to Defend Against NPM Software Supply Chain Attacks
chrome_reader_mode
Article

How to Defend Against NPM Software Supply Chain Attacks

Practical steps security teams and developers can take to reduce risks from software supply chain attacks targeting the npm registry.

npm Malware Outbreak: Tinycolor and CrowdStrike Packages Compromised
chrome_reader_mode
Article

npm Malware Outbreak: Tinycolor and CrowdStrike Packages Compromised

A virus-like npm malware attack has spread to 180+ packages so far, including CrowdStrike and Tinycolor.

Endor Labs Drives 225% Revenue Growth, Pioneers the Future of Secure SDLC
chrome_reader_mode
Article

Endor Labs Drives 225% Revenue Growth, Pioneers the Future of Secure SDLC

AppSec company’s rapid growth reflects rising demand for security built for the speed and scale of engineering teams shaping the future of software with AI

Major Supply Chain Attack Compromises Popular npm Packages Including chalk and debug
chrome_reader_mode
Article

Major Supply Chain Attack Compromises Popular npm Packages Including chalk and debug

Popular npm packages including chalk and debug were compromised in a major supply chain attack. Learn what happened, root cause, impact, and how to mitigate.

Nx build platform compromised by supply chain attack – How attackers collude with AI code assistants
chrome_reader_mode
Article

Nx build platform compromised by supply chain attack – How attackers collude with AI code assistants

Nx supply chain attack: malicious npm versions of Nx exfiltrated SSH keys and tokens to GitHub—abusing AI code assistants. Learn how to detect and fix.

How We Cracked SCA for C/C++ Codebases
chrome_reader_mode
Article

How We Cracked SCA for C/C++ Codebases

Endor Labs improves C/C++ SCA by combining cryptographic hashing, code embeddings, and a curated index for accurate dependency and vulnerability detection.

Cursor Develops a Secure Product with Endor Labs
chrome_reader_mode
Article

Cursor Develops a Secure Product with Endor Labs

Cursor uses Endor Labs for SCA and dependency management. Learn how they reduced noise, accelerated remediation, and enabled both stable code and focused engineers.

When CodeRabbit became PwnedRabbit: A cautionary tale for every GitHub App vendor (and their customers)
chrome_reader_mode
Article

When CodeRabbit became PwnedRabbit: A cautionary tale for every GitHub App vendor (and their customers)

Kudelski Security uncovered an RCE flaw in CodeRabbit exposing 1M+ repos. Here’s what happened, how it was fixed, and key lessons for secure AI apps.

Shadow AI in Your Codebase: A Hidden Supply Chain Risk
chrome_reader_mode
Article

Shadow AI in Your Codebase: A Hidden Supply Chain Risk

Unvetted AI models and services are entering your codebase. Do you have a plan to find and govern them?

Five9 Transforms Software Supply Chain Security with Endor Labs
chrome_reader_mode
Article

Five9 Transforms Software Supply Chain Security with Endor Labs

Five9 uses Endor Labs’ SCA to ensure they focus on just the risks that matter and can respond quickly to zero days.

Under the Hood: How I Vet Early-Stage Startups for Critical Security Programs
chrome_reader_mode
Article

Under the Hood: How I Vet Early-Stage Startups for Critical Security Programs

Greg Pettengill, a Principal Product Security Engineer at Five9, is an early adopter of startup technology. In this article he shares his methodology for picking vendors that can deliver on promises.

Detect End-of-Life (EOL) Software in Containers with Endor Labs
chrome_reader_mode
Article

Detect End-of-Life (EOL) Software in Containers with Endor Labs

Endor Labs now detects end-of-life (EOL) software in containers, helping AppSec teams eliminate risk early.

The Most Common Security Vulnerabilities in AI-Generated Code
chrome_reader_mode
Article

The Most Common Security Vulnerabilities in AI-Generated Code

Learn about the most common and emerging security risks of AI-generated code, from injection flaws to hallucinated dependencies.

The Last Mile of AI Productivity Is Code Review
chrome_reader_mode
Article

The Last Mile of AI Productivity Is Code Review

Developers are generating more code with AI coding assistants, but release velocity isn’t increasing. Here’s how to fix it.

Fireside Chat: CISOs on AI, Shift Left, and Building Trust at People.ai and AppLovin
chrome_reader_mode
Article

Fireside Chat: CISOs on AI, Shift Left, and Building Trust at People.ai and AppLovin

Learn how top security leaders think about using AI code assistants to achieve the shift-left dream, increase release velocity, and build developer trust.

Fireside Chat: Building a High-Trust Product Security Program at Zebra
chrome_reader_mode
Article

Fireside Chat: Building a High-Trust Product Security Program at Zebra

Learn how Zebra Technologies builds a successful Product Security program by using reachability and risk ranking to prioritize critical vulnerabilities, making fixes fast and building developer trust.

How to Detect LLM Prompt Injection Risks
chrome_reader_mode
Article

How to Detect LLM Prompt Injection Risks

Learn how to detect prompt injection vulnerabilities in GenAI applications and prevent attackers from exploiting LLM-powered workflows.

Why Your AI Code Assistant Might Be Shipping CVEs
chrome_reader_mode
Article

Why Your AI Code Assistant Might Be Shipping CVEs

LLMs often recommend outdated or vulnerable open source packages—here’s why it happens, why it matters, and how AppSec and DevOps leaders can stay ahead.

Anti-Pattern Avoidance: A Simple Prompt Pattern for Safer AI-Generated Code
chrome_reader_mode
Article

Anti-Pattern Avoidance: A Simple Prompt Pattern for Safer AI-Generated Code

How CWE-specific prompts cut LLM code vulnerabilities by more than half.

Endor Labs now integrates with GitHub Copilot in VS Code
chrome_reader_mode
Article

Endor Labs now integrates with GitHub Copilot in VS Code

Secure AI-generated code at the source with a new integration for GitHub Copilot powered by the Endor Labs platform.

Securing AI Coding Assistants: A Total Cost Analysis
chrome_reader_mode
Article

Securing AI Coding Assistants: A Total Cost Analysis

A CISO’s guide to analyzing and containing the security costs of AI-generated code

Endor Labs Now Available on Google Cloud Marketplace
chrome_reader_mode
Article

Endor Labs Now Available on Google Cloud Marketplace

Endor Labs is now available on the Google Cloud Marketplace, enabling faster procurement and deployment of software supply chain security for GCP customers and partners.

How to Detect Infrastructure as Code (IaC) Misconfigurations with AI Security Code Review
chrome_reader_mode
Article

How to Detect Infrastructure as Code (IaC) Misconfigurations with AI Security Code Review

Learn how to detect misconfigurations in Infrastructure as Code (IaC) files, preventing privilege escalation and unsafe defaults before they reach production.

Endor Labs now integrates with Cursor AI Code Editor
chrome_reader_mode
Article

Endor Labs now integrates with Cursor AI Code Editor

Secure AI-generated code at the source with a new Cursor integration powered by the Endor Labs platform.

Secure-Insecure Diff: A Smarter Way to Prompt for Safer Code
chrome_reader_mode
Article

Secure-Insecure Diff: A Smarter Way to Prompt for Safer Code

How a multi-step prompt technique can reduce vulnerabilities in AI-generated code

How to Evaluate Endor Labs SCA for C/C++ Projects
chrome_reader_mode
Article

How to Evaluate Endor Labs SCA for C/C++ Projects

A step-by-step guide to testing Endor Labs SCA accuracy for C/C++ projects

CVE-2025-54313: eslint-config-prettier Compromise — High Severity but Windows-Only
chrome_reader_mode
Article

CVE-2025-54313: eslint-config-prettier Compromise — High Severity but Windows-Only

CVE-2025-54313 tracks a supply chain attack on eslint-config-prettier, where four malicious versions of a popular npm library targeted Windows machines with a remote-code execution payload. Learn how it happened and how to stay safe.

Everything You Need To Know About The FedRAMP RFC-0012
chrome_reader_mode
Article

Everything You Need To Know About The FedRAMP RFC-0012

The new FedRAMP RFC shifts the standard to require deep context into the reachability and exploitability of vulnerabilities. Here’s what you need to know.

Structuring Prompts for Secure Code Generation
chrome_reader_mode
Article

Structuring Prompts for Secure Code Generation

A practical guide to embedding security requirements into AI coding workflows

Endor Outpost: Deploy Endor Labs Behind Your Firewall
chrome_reader_mode
Article

Endor Outpost: Deploy Endor Labs Behind Your Firewall

Endor Outpost extends the full capabilities of the Endor Labs AppSec platform to Self-Hosted SCMs like Bitbucket Datacenter and GitLab Self-Managed.

Endor Labs & Oligo: Closing the Loop Between Secure Code and Secure Runtime
chrome_reader_mode
Article

Endor Labs & Oligo: Closing the Loop Between Secure Code and Secure Runtime

Endor Labs and Oligo keep pipelines fast and secure with unified reachability, real-time threat blocking, and safe, automatic fixes.

Struggling to Patch Spring-Web? Try This Instead
chrome_reader_mode
Article

Struggling to Patch Spring-Web? Try This Instead

Fixing Java deserialization vulnerabilities in Spring-Web is notoriously difficult, but Endor Labs offers an alternative with patches.

Under the Hood: People.ai's Proactive Approach to AI Security
chrome_reader_mode
Article

Under the Hood: People.ai's Proactive Approach to AI Security

Hear how a CISO at an AI-first company is thinking about securing AI, and how AI should improve security programs.

People.ai Transforms Security and Compliance with Endor Labs
chrome_reader_mode
Article

People.ai Transforms Security and Compliance with Endor Labs

People.ai replaced Snyk with Endor Labs for application security that provides an outstanding developer experience and makes it easier (and cheaper) to hit compliance targets.

Streamline Investigation with Enriched Vulnerability Search
chrome_reader_mode
Article

Streamline Investigation with Enriched Vulnerability Search

Endor Labs Vulnerability Search helps you investigate CVEs with enriched metadata, call paths, and precise impact analysis—resolving conflicts across public feeds.

What is AppSec? A 2025 Guide for Security Practitioners
chrome_reader_mode
Article

What is AppSec? A 2025 Guide for Security Practitioners

Learn what Application Security (AppSec) is, why it matters, and how to build a modern, scalable AppSec program across the SDLC.

Cracking the Code: Solving the Challenges of C/C++ Software Composition Analysis
chrome_reader_mode
Article

Cracking the Code: Solving the Challenges of C/C++ Software Composition Analysis

This whitepaper details Endor Labs’ novel approach to indexing open source dependencies and detecting vulnerabilities in C and C++ codebases.

Mysten Labs Improves DevEx with Endor Labs
chrome_reader_mode
Article

Mysten Labs Improves DevEx with Endor Labs

Within weeks of deployment, Endor Labs helped Mysten Labs transform its application security strategy.

Under the Hood: Mysten Labs’ Strategies for Building the Most Secure Blockchain
chrome_reader_mode
Article

Under the Hood: Mysten Labs’ Strategies for Building the Most Secure Blockchain

How Mysten Labs builds secure and low-friction systems for blockchain by focusing on code ownership, usability, and AppSec strategy.

Zebra Technologies Cuts SCA Noise by 97% with Endor Labs
chrome_reader_mode
Article

Zebra Technologies Cuts SCA Noise by 97% with Endor Labs

With fewer alerts and more accuracy, Zebra Technologies now spends more time building and less time chasing false positives.

Next-Gen SCA for C/C++: Closing the Detection Gap
chrome_reader_mode
Article

Next-Gen SCA for C/C++: Closing the Detection Gap

A new method for identifying OSS dependencies and vulnerabilities in C/C++ with greater accuracy and precision than legacy tools.

no-results
Sorry, no results matching your search.

Book a Demo

Protect your open source dependencies, secrets, and CI/CD pipelines without slowing down devs.