Blog
Security That Ships
Security, strategy, and developer-first thinking for teams pushing open-source forward.
This is some text inside of a div block.

Hopper Launches Four AI-Powered AppSec Products for the Age of Modern Software
Traditional AppSec tools weren’t built for AI-powered development. Hopper’s new suite delivers visibility and control across open-source, embedded models, and AI-generated code.
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.

Meet Grace: Hopper’s AI-Powered MCP Server for Open-Source Security
Grace connects Hopper’s real-time data to AI agents through the Model Context Protocol (MCP), automating triage and remediation in minutes.
Product

How Hopper Builds Fix Plans Developers Actually Use
Hopper turns noisy vulnerability alerts into developer-ready fix plans using function-level reachability, call graph evidence, and effort-aware remediation. Learn how.
Insights

Hopper Launches Four AI-Powered AppSec Products for the Age of Modern Software
Traditional AppSec tools weren’t built for AI-powered development. Hopper’s new suite delivers visibility and control across open-source, embedded models, and AI-generated code.
Announcements

Hopper Maintains SOC 2 Type II and ISO 27001 Certifications
Hopper is SOC 2 Type II and ISO/IEC 27001 certified, demonstrating our commitment to enterprise-grade security and protecting customer data.
Announcements

Good Vibes, Bad Code? Vibe Coding and How to Secure It with Hopper
AI coding assistants are speeding up development by generating open-source code on the fly. But with that speed comes risk. Unpack how vibe coding expands your attack surface and how Hopper helps you secure what actually matters, down to the function level.
Insights

The Hopper Bitbucket App: Secure Your Open-Source Dependencies with Function-Level Precision
Discover how Hopper’s Bitbucket Server integration helps you secure open-source dependencies with function-level reachability analysis. Eliminate false positives, automate license compliance, and generate SBOMs — all with agentless, read-only access.
Product

Beyond Packages: Precision with Function-Level Reachability
Most SCA tools claim “reachability” but rely on imprecise methods that flood teams with false positives. Hopper delivers true function-level analysis to reveal real risks.
Insights

Eyes Wide Open: Building Hopper in a Crowded Market
Building a new security tool in a crowded space takes more than ambition. It takes humility, hard conversations, and the willingness to listen with eyes wide open. This is the journey that shaped Hopper from the very first day.
Insights

Fifty Shades of JAR: A Love Story Between Devs and CVEs
Shaded Java dependencies hide real vulnerabilities from most SCA tools. Hopper analyzed over 16M artifacts from Maven Central and discovered over 2.5 million hidden vulnerabilities. With function-level reachability, only a few actually mattered.
Insights
Newsroom
Hopper Press Mentions and Releases
Visit Publication Article

September 15, 2025
In Praise of Resilience: Why We Invested in Hopper Security
-Logo.wine.png)
Visit Publication Article

September 4, 2025
The ART of Taming Agents: A CISO’s Framework for Managing Enterprise Risk in the Age of Agentic AI

Visit Publication Article

April 25, 2025
Hopper Uncovers Over 2.5 Million Vulnerabilities Hidden in Java

Visit Publication Article

April 22, 2025
Hopper raises $7.6M to accelerate software development with streamlined risk management

Visit Publication Article

April 22, 2025
Open Source Security Firm Hopper Emerges From Stealth With $7.6M in Funding
