About
Blog
Get a Demo
Blog
Security That Ships
Security, strategy, and developer-first thinking for teams pushing open-source forward.
Announcements
4 minutes
Out of Stealth, Into the Future of Open-Source Security
Open-source now powers a $9T ecosystem. It’s the backbone of the tools, systems, and platforms that shape our digital lives. But with that power comes risk. And with that risk, a growing sense of fatigue.
Read more
Insights
12 minutes
Fifty Shades of JAR: A Love Story Between Devs and CVEs
Shaded Java dependencies hide real vulnerabilities from most SCA tools. Hopper analyzed over 16M artifacts from Maven Central and discovered over 2.5 million hidden vulnerabilities. With function-level reachability, only a few actually mattered.
Read more
Insights
6 minutes
Why Hopper is What’s Next for SCA
Legacy Software Composition Analysis (SCA) solutions are falling short. They generate an overwhelming number of false positives, leaving security and engineering teams scrambling to prioritize a never-ending stream of vulnerabilities.
Read more
Announcements
4 minutes
Out of Stealth, Into the Future of Open-Source Security
Open-source now powers a $9T ecosystem. It’s the backbone of the tools, systems, and platforms that shape our digital lives. But with that power comes risk. And with that risk, a growing sense of fatigue.
Read more