Blog

Security That Ships

Security, strategy, and developer-first thinking for teams pushing open-source forward.

All Posts
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
Insights
12 minutes
Insights

Fifty Shades of JAR: A Love Story Between Devs and CVEs

Shaded Java dependencies hide real vulnerabilities from most SCA tools. Hopper analyzed over 16M artifacts from Maven Central and discovered over 2.5 million hidden vulnerabilities. With function-level reachability, only a few actually mattered.
Insights
Insights
6 minutes
Insights

Why Hopper is What’s Next for SCA

Legacy Software Composition Analysis (SCA) solutions are falling short. They generate an overwhelming number of false positives, leaving security and engineering teams scrambling to prioritize a never-ending stream of vulnerabilities.
Insights
Announcements
4 minutes
Announcements

Out of Stealth, Into the Future of Open-Source Security

Open-source now powers a $9T ecosystem. It’s the backbone of the tools, systems, and platforms that shape our digital lives. But with that power comes risk. And with that risk, a growing sense of fatigue.
Announcements

Newsroom

Hopper Press Mentions and Releases

Visit Publication Article

April 25, 2025

Hopper Uncovers Over 2.5 Million Vulnerabilities Hidden in Java
Visit Publication Article

April 22, 2025

Hopper raises $7.6M to accelerate software development with streamlined risk management
Visit Publication Article

April 22, 2025

Open Source Security Firm Hopper Emerges From Stealth With $7.6M in Funding