JFrog Security Research

Cutting Edge Security Research to Protect the Modern Software Supply Chain

Our dedicated team of security engineers and researchers are committed to advancing software security through discovery, analysis, and exposure of new vulnerabilities and attack methods.

Software Vulnerabilities

Software Vulnerabilities

JFrog security researchers and engineers collaborate to create advanced vulnerability scanners, built on a deep understanding of attackers' techniques.

We use our automated scanners to help the community by continually identifying new vulnerabilities in publicly available software packages and disclosing them.

Latest vulnerabilities discovered by the team

Malicious Packages

Malicious Packages

Given the widespread use of open-source software (OSS) packages in modern application development, public OSS repositories have become a popular target for supply chain attacks.

To help foster a secure environment for developers, the JFrog Security research team continuously monitors popular repositories with our automated tooling, and reports malicious packages discovered to repository maintainers and the wider community.

Latest malicious packages disclosed by the team

  • twitter
    @amcdc/backend-api-swagger - PII stealer
    npm<1k total downloads
    Published on 13 May. 2022
  • twitter
    @azure-test2/test2 - PII stealer
    npm<1k total downloads
    Published on 13 May. 2022
  • twitter
    @sorare-marketplace/components - PII stealer
    npm<1k total downloads
    Published on 13 May. 2022
  • twitter
    angieslist-composed-components - PII stealer
    npm<1k total downloads
    Published on 13 May. 2022
  • twitter
    angieslist-gulp-build-tasks - PII stealer
    npm<1k total downloads
    Published on 13 May. 2022
The JFrog Detection Edge

The JFrog Detection Edge

The JFrog Security research team is part of the group behind JFrog Xray, enhancing its unique vulnerability database and utilizing patented technology to quickly detect unknown security issues in both open source and proprietary code.

The JFrog Detection Edge

Report Vulnerabilities Discovered in JFrog Products

The security and quality of our code is a top priority for JFrog. If you find a vulnerability or any other type of security issue in one of our products, please report it to us immediately. Security researchers may be able to participate in a bug bounty program and earn rewards for their findings.

Learn more about how to report a vulnerability >

Powered By jfrog.com