TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

Show HN: Open-Source Security Monitoring with AI and License Compliance

1 pointsby daudmalik065 months ago
Hey Hacker News, I’m Dawood, creator of Vulert. We’ve just released Vulert 2.0, a platform designed to monitor open-source dependencies for security vulnerabilities, ensure license compliance, and recommend fixes—without requiring access to your codebase or installation.<p>---------- ---------- What&#x27;s New in 2.0:<p>License Compliance: Automatically checks if your open-source dependencies comply with legal requirements, helping you avoid costly legal issues.<p>Docker Container Security: New insights into risks in container images, with actionable recommendations for improving security.<p>AI-Enhanced Vulnerability Scanning: Vulert Code Guard (coming soon) uses AI to detect if your app is actively using vulnerable functions from open-source libraries, helping you focus on real threats.<p>SBOM Export &amp; Reports: Export your app dependencies as SBOMs, and generate vulnerability reports in PDF format.<p>Application Manager: Configure settings, and integrate with Jira to auto-create issues when vulnerabilities are found.<p>---------- ---------- Why Vulert?<p>Open-Source Growth, Increasing Risks: With the average organization using 1,700 open-source tools, the risk of vulnerabilities is skyrocketing.<p>Targeted Attacks on Open-Source: Attackers are increasingly exploiting open-source components, and traditional security tools often miss the mark.<p>Lack of Effective Solutions: Most existing tools are integration-heavy, require full access to your codebase, or are expensive. Vulert provides a lightweight, cost-effective solution.<p>---------- ---------- Vulert’s Approach:<p>Privacy-First: No need to inspect your code. Just upload your open-source list (e.g., package-lock.json).<p>Proactive: Receive alerts for new vulnerabilities as soon as they’re reported.<p>Affordable: Pay only for the modules you need, starting at $10&#x2F;month per application.<p>---------- ---------- How It Works:<p>Continuous Monitoring: Stay up-to-date with security advisories across all your dependencies.<p>Real-Time Alerts: Get notifications about new vulnerabilities or threats in your dependencies.<p>Fast Response: If a critical vulnerability is detected, you’ll get an immediate alert.<p>---------- ---------- Key Features:<p>Interactive Dashboard: See your app&#x27;s security health at a glance.<p>CI&#x2F;CD Integration: Automatically catch vulnerabilities during development.<p>SIEM Integration: Works with tools like Splunk for continuous monitoring.<p>---------- ---------- Modules Available:<p>Open Source (SCA): Monitors for vulnerabilities in your open-source dependencies.<p>License Compliance: Checks your dependencies for license issues and legal risks.<p>Container Security: Analyzes container images for security issues.<p>SBOM Export: Generates CycloneDX-formatted SBOMs for security and compliance.<p>Code Guard (Coming Soon): AI-powered tool to identify vulnerable functions in your app code.<p>---------- ---------- Try our Vulert Playground to test your app’s security with no sign-up required. Upload your manifest file and get a risk assessment.<p>Useful Links:<p>Vulert Demo Dashboard: <a href="https:&#x2F;&#x2F;vulert.com&#x2F;demo-login?demo=true" rel="nofollow">https:&#x2F;&#x2F;vulert.com&#x2F;demo-login?demo=true</a> Vulert Playground: <a href="https:&#x2F;&#x2F;vulert.com&#x2F;abom" rel="nofollow">https:&#x2F;&#x2F;vulert.com&#x2F;abom</a> Vulert Vulnerability Database: <a href="https:&#x2F;&#x2F;vulert.com&#x2F;vuln-db" rel="nofollow">https:&#x2F;&#x2F;vulert.com&#x2F;vuln-db</a> Vulert Blog: <a href="https:&#x2F;&#x2F;vulert.com&#x2F;blog" rel="nofollow">https:&#x2F;&#x2F;vulert.com&#x2F;blog</a><p>---------- ---------- Join the Open-Source Security Movement: We’re looking for feedback on Vulert 2.0. Feel free to ask questions, suggest improvements, or share your thoughts on how we can help make open-source software more secure.

1 comment

popey5 months ago
The vulnerability database search didn&#x27;t find CVE-2024-9990 - a valid CVE according to NVD: <a href="https:&#x2F;&#x2F;nvd.nist.gov&#x2F;vuln&#x2F;detail&#x2F;CVE-2024-9990" rel="nofollow">https:&#x2F;&#x2F;nvd.nist.gov&#x2F;vuln&#x2F;detail&#x2F;CVE-2024-9990</a><p>I submitted a package-lock.json file to the playground and got a vulnerability report after processing. The sort order next to the pie chart is weird. Medium &#x2F; High &#x2F; Critical &#x2F; Low. I&#x27;d expect Critical &#x2F; High &#x2F; Medium &#x2F; Low?<p>The vuln report ended up in my email spam folder.<p>I had to hit &#x27;resend&#x27; multiple times to receive the verification email. Once I did, I had to either create a new account or login. I don&#x27;t yet have a password. When I tried to create an account, it said my email was already taken. This onboarding flow seems quite janky.<p>Is Vulert Open Source software? I couldn&#x27;t find any links or repos. What does &quot;Join the Open-Source Security Movement&quot; mean in this context?