Blog

Security That Ships

Security, strategy, and developer-first thinking for teams pushing open-source forward.

All Posts
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
Insights
5 minutes
Insights

Internal Libraries: The Most Overlooked Attack Surface

Patching internal libraries isn’t enough if outdated versions are still pulled into production. Hopper exposes these hidden paths by tracing usage across services, identifying vulnerable versions, and prioritizing them using reachability and real-world exploitability.
Insights
Product
5 minutes
Product

Meet Grace: Hopper’s AI-Powered MCP Server for Open-Source Security

Grace connects Hopper’s real-time data to AI agents through the Model Context Protocol (MCP), automating triage and remediation in minutes.
Product
Insights
7 minutes
Insights

How Hopper Builds Fix Plans Developers Actually Use

Hopper turns noisy vulnerability alerts into developer-ready fix plans using function-level reachability, call graph evidence, and effort-aware remediation. Learn how.
Insights
Announcements
5 minutes
Announcements

Hopper Launches Four AI-Powered AppSec Products for the Age of Modern Software

Traditional AppSec tools weren’t built for AI-powered development. Hopper’s new suite delivers visibility and control across open-source, embedded models, and AI-generated code.
Announcements
Announcements
2 minutes
Announcements

Hopper Maintains SOC 2 Type II and ISO 27001 Certifications

Hopper has achieved and actively maintains both SOC 2 Type II and ISO/IEC 27001 certifications, reinforcing our commitment to enterprise-grade security and compliance. These certifications validate our internal controls, secure development practices, and the safeguards we implement to protect customer data across the software supply chain.
Announcements
Insights
7 minutes
Insights

Good Vibes, Bad Code? Vibe Coding and How to Secure It with Hopper

AI coding assistants are speeding up development by generating open-source code on the fly. But with that speed comes risk. Unpack how vibe coding expands your attack surface and how Hopper helps you secure what actually matters, down to the function level.
Insights
Product
4 minutes
Product

The Hopper Bitbucket App: Secure Your Open-Source Dependencies with Function-Level Precision

Discover how Hopper’s Bitbucket Server integration helps you secure open-source dependencies with function-level reachability analysis. Eliminate false positives, automate license compliance, and generate SBOMs — all with agentless, read-only access.
Product
Insights
13 minutes
Insights

Beyond Packages: Precision with Function-Level Reachability

Most SCA tools claim “reachability” but rely on imprecise methods that flood teams with false positives. Hopper delivers true function-level analysis to reveal real risks.
Insights
Insights
8 minutes
Insights

Eyes Wide Open: Building Hopper in a Crowded Market

Building a new security tool in a crowded space takes more than ambition. It takes humility, hard conversations, and the willingness to listen with eyes wide open. This is the journey that shaped Hopper from the very first day.
Insights

Newsroom

Hopper Press Mentions and Releases

Visit Publication Article

April 25, 2025

Hopper Uncovers Over 2.5 Million Vulnerabilities Hidden in Java
Visit Publication Article

April 22, 2025

Hopper raises $7.6M to accelerate software development with streamlined risk management
Visit Publication Article

April 22, 2025

Open Source Security Firm Hopper Emerges From Stealth With $7.6M in Funding