Endor Labs’ cover photo
Endor Labs

Endor Labs

Software Development

Palo Alto, California 15,905 followers

Application Security Platform for the Software Development Revolution

About us

Endor Labs is the AppSec platform built for the AI era. It helps teams find, prioritize, and fix the most critical risks in code, whether written by humans or AI—faster. Endor Labs understands the entire structure of your codebase, from 40 year-old C++ to modern Bazel monorepos. Powered by AI agents and the industry's richest security dataset about open source code, Endor Labs doesn’t just flag issues, it reduces noise, prioritizes what matters most, and proposes intelligent remediations based on the context of your code. Whether you’re an upstart or in the Fortune 500, Endor Labs helps AppSec and development teams eliminate noisy alerts, fix code 6.2x faster, and stay compliant with standards like FedRAMP, PCI, SLSA, and NIST SSDF.

Website
https://www.endorlabs.com/
Industry
Software Development
Company size
51-200 employees
Headquarters
Palo Alto, California
Type
Privately Held
Founded
2021
Specialties
SCA, cybersecurity, open source security, devsecops, software supply chain security, SDLC, AI Model Discovery, Container Scanning, and SAST

Products

Locations

Employees at Endor Labs

Updates

  • “Can you trust the MCPs on GitHub without running your own scans?” In this clip with Hacker Valley Media, Varun Badhwar and Henrik Plate talk about a hard truth: We’ve built implicit trust into open source. And attackers are exploiting it every week. Whether it’s traditional dependencies, MCPs on GitHub, or models pulled from Hugging Face, third-party code needs to be vetted like anything else running on your system. Trust is not a control. Verification is. https://lnkd.in/gdRv_p9D #AppSec #MCP

  • Most companies today deal with tens of thousands of alerts from code scanning tools. That overhead becomes a tax on both security and developer productivity. We built Endor Labs differently. An AI-native platform designed with code context at the center. The result: - ~90%+ reduction in security alerts - Faster remediation, because fixes come with real context developers can act on - Security that fits naturally into AI-native development workflows, including coding agents and MCP integrations The goal isn’t more alerts. It’s quieter pipelines, faster fixes, and more secure software, by default. https://lnkd.in/gdRv_p9D #AppSec #MCP

  • Why reachability matters in SCA (and why transitive dependencies are the real risk). If you’re using Software Composition Analysis, finding vulnerable packages is only half the story. The real question is: can your application actually reach that vulnerable code? In this video, Robert Haynes, Endor Labs Technical Marketing Engineer, explains 👇 • What “reachability” really means in AppSec • Why transitive dependencies are where most teams get tripped up • How reachability cuts noise and helps teams focus on issues that actually matter If you’re tired of long vulnerability lists that don’t map to real risk, this one’s for you. https://lnkd.in/gtbzCe_U #ApplicationSecurity #AppSec #SCA #SoftwareSupplyChain #DeveloperExperience #DevSecOps

  • Check out this detailed write-up from security researcher Cristian-Alexandru Staicu about 8 node.js CVEs disclosed today. #nodejs #appsec #CVE #vulnerability

    View profile for Cristian-Alexandru Staicu

    Senior Security Researcher @Endor Labs

    After multiple postponements, Node.js released minutes ago a security patch containing eight vulnerabilities: https://lnkd.in/deYctRdj. All Node.js users are encouraged to migrate to the patched version to prevent exploitation of production systems. Below, I break down my assessment of these vulnerabilities, focusing on the likelihood of exploitation for each of them. Four of the vulnerabilities are denial of service (DoS) vulnerabilities that can cause hard crashes or memory leaks, potentially allowing attackers to take down Node.js servers with low-volume DoS attacks. However, they only affect certain types of applications, e.g., that use "pskCallback" during TLS handshake or that do not set error handlers on TLSSockets. The HTTP/2 vulnerability (CVE-2025-59465) seems to be the most serious out of them since it enables reliable, remote DoS attacks that can bring down Node.js instances with a single crafted request. Thus, IDS systems should be configured to discard HTTP/2 requests with oversized, invalid HPACK data in HEADERS before they reach your Node.js instances. Three of the vulnerabilities are related to Node.js's recently introduced permission model: https://lnkd.in/dkfKehY6. These vulnerabilities are very similar to the ones we described with Abdullah AlHamdan for Deno (https://lnkd.in/dEbtgBVd), allowing attackers to bypass the permission system via symbolic links or other powerful UNIX primitives. However, the permission system is not yet widely adopted by Node.js applications, and these attacks require specific permission configurations, making remote exploitation extremely unlikely. More interesting, the vulnerability CVE-2025-55131 allows reading uninitialized memory values via race conditions. However, this vulnerability only affects specific buffer-related APIs like Buffer.alloc when run inside the "vm" module. Since the "vm" module has been repeatedly marked by Node.js maintainers as inappropriate for running untrusted JavaScript code (see the documentation https://lnkd.in/d5459Kzz, this discussion https://lnkd.in/dWKKMXxQ and our work on JS sandboxing at https://lnkd.in/dWyyMVQv), the likelihood that attackers can trigger this race condition remotely should be very low, if developers followed this recommendation. That is, without in-process + in-vm execution, attackers will have a hard time 1) finding production applications that use this module (vm) that is mainly intended for testing and not for running untrusted code, 2) force the application to run specific APIs inside the "vm" context, 3) control timeouts and other timing-related parameters to force the uninitialized buffer via the race condition, 4) obtain the value of the unitialized buffer from the vm. See more details in our Endor Labs blog post: https://lnkd.in/dGPZ5pVY

  • View organization page for Endor Labs

    15,905 followers

    There is a new supply chain attack targeting the n8n ecosystem. npm has removed multiple malicious packages, but attackers could re-use this tactic. ⚠️ What happened?  A malicious npm package, disguised as a legitimate Google Ads integration, was published as an n8n community node. Once installed, it quietly harvested OAuth tokens and API keys during normal workflow execution and exfiltrated them to an attacker-controlled server. 🤔 Why does it matter?  This attack is dangerous because organizations have trust that any installed node inherits in the ecosystem. This mirrors earlier campaigns like Shai-Hulud, which abused GitHub Actions workflows. Attackers are moving “up the stack” to platforms that centralize credentials and automate business logic. 🛠️ How can you reduce n8n risk?  1️⃣ Use official nodes and prefer n8n's built-in integrations 2️⃣ Audit packages before installing them 3️⃣ Scrutinize package metadata 4️⃣ Monitor outbound network traffic  5️⃣ Use isolated service accounts with the least privileges Read the deep dive here: https://lnkd.in/gzcFxNGG #malware #n8n #npm

    • No alternative text description for this image
  • Join Nate Michalov for the #OWASP St. Louis Meetup: Lessons from npm’s Dark Side: These Are Not the Packages You’re Looking For. The JavaScript ecosystem, especially npm, is a prime target for supply-chain malware, and with JavaScript powering the web, the impact is widespread. We’ll cover why attackers target npm, walk through real attack examples, and share what you can do to protect yourself and your organization. 🗓 January 13, 2026 ⏰ 6:00–7:30 PM Register here: https://lnkd.in/gkYWKAjH #StLouisMeetup #AppSec

    • No alternative text description for this image
  • Endor Labs reposted this

    Can you actually trust the MCPs you’re pulling straight from GitHub? 👀 Unverified code running in your environment shouldn’t feel normal. Varun Badhwar, Co-Founder & CEO of Endor Labs, and Henrik Plate, Principal Security Researcher and co-author of State of Dependency Management 2025, join us on this week’s episode. They're breaking down how AI-assisted development is changing the SDLC, why agents and MCP servers are a growing supply chain risk, and what security teams need to do before speed turns into chaos. New episode out now wherever you get your podcasts! 🎙️ #Cybersecurity #AI #MCP

Similar pages

Browse jobs

Funding

Endor Labs 5 total rounds

Last Round

Series B

US$ 93.0M

See more info on crunchbase