Hey Hacker News, I’m Dawood, creator of Vulert. We’ve just released Vulert 2.0, a platform designed to monitor open-source dependencies for security vulnerabilities, ensure license compliance, and recommend fixes—without requiring access to your codebase or installation.<p>----------
----------
What's New in 2.0:<p>License Compliance: Automatically checks if your open-source dependencies comply with legal requirements, helping you avoid costly legal issues.<p>Docker Container Security: New insights into risks in container images, with actionable recommendations for improving security.<p>AI-Enhanced Vulnerability Scanning: Vulert Code Guard (coming soon) uses AI to detect if your app is actively using vulnerable functions from open-source libraries, helping you focus on real threats.<p>SBOM Export & Reports: Export your app dependencies as SBOMs, and generate vulnerability reports in PDF format.<p>Application Manager: Configure settings, and integrate with Jira to auto-create issues when vulnerabilities are found.<p>----------
----------
Why Vulert?<p>Open-Source Growth, Increasing Risks: With the average organization using 1,700 open-source tools, the risk of vulnerabilities is skyrocketing.<p>Targeted Attacks on Open-Source: Attackers are increasingly exploiting open-source components, and traditional security tools often miss the mark.<p>Lack of Effective Solutions: Most existing tools are integration-heavy, require full access to your codebase, or are expensive. Vulert provides a lightweight, cost-effective solution.<p>----------
----------
Vulert’s Approach:<p>Privacy-First: No need to inspect your code. Just upload your open-source list (e.g., package-lock.json).<p>Proactive: Receive alerts for new vulnerabilities as soon as they’re reported.<p>Affordable: Pay only for the modules you need, starting at $10/month per application.<p>----------
----------
How It Works:<p>Continuous Monitoring: Stay up-to-date with security advisories across all your dependencies.<p>Real-Time Alerts: Get notifications about new vulnerabilities or threats in your dependencies.<p>Fast Response: If a critical vulnerability is detected, you’ll get an immediate alert.<p>----------
----------
Key Features:<p>Interactive Dashboard: See your app's security health at a glance.<p>CI/CD Integration: Automatically catch vulnerabilities during development.<p>SIEM Integration: Works with tools like Splunk for continuous monitoring.<p>----------
----------
Modules Available:<p>Open Source (SCA): Monitors for vulnerabilities in your open-source dependencies.<p>License Compliance: Checks your dependencies for license issues and legal risks.<p>Container Security: Analyzes container images for security issues.<p>SBOM Export: Generates CycloneDX-formatted SBOMs for security and compliance.<p>Code Guard (Coming Soon): AI-powered tool to identify vulnerable functions in your app code.<p>----------
----------
Try our Vulert Playground to test your app’s security with no sign-up required. Upload your manifest file and get a risk assessment.<p>Useful Links:<p>Vulert Demo Dashboard: <a href="https://vulert.com/demo-login?demo=true" rel="nofollow">https://vulert.com/demo-login?demo=true</a>
Vulert Playground: <a href="https://vulert.com/abom" rel="nofollow">https://vulert.com/abom</a>
Vulert Vulnerability Database: <a href="https://vulert.com/vuln-db" rel="nofollow">https://vulert.com/vuln-db</a>
Vulert Blog: <a href="https://vulert.com/blog" rel="nofollow">https://vulert.com/blog</a><p>----------
----------
Join the Open-Source Security Movement:
We’re looking for feedback on Vulert 2.0. Feel free to ask questions, suggest improvements, or share your thoughts on how we can help make open-source software more secure.
The vulnerability database search didn't find CVE-2024-9990 - a valid CVE according to NVD: <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-9990" rel="nofollow">https://nvd.nist.gov/vuln/detail/CVE-2024-9990</a><p>I submitted a package-lock.json file to the playground and got a vulnerability report after processing. The sort order next to the pie chart is weird. Medium / High / Critical / Low. I'd expect Critical / High / Medium / Low?<p>The vuln report ended up in my email spam folder.<p>I had to hit 'resend' multiple times to receive the verification email. Once I did, I had to either create a new account or login. I don't yet have a password. When I tried to create an account, it said my email was already taken. This onboarding flow seems quite janky.<p>Is Vulert Open Source software? I couldn't find any links or repos. What does "Join the Open-Source Security Movement" mean in this context?