WhiteSource becomes Mend and adds code autocorrect


WhiteSource changes company name to Mend

An application code security firm has expanded its repertoire and changed its name to better reflect its new capabilities. white source became To fix with the addition of automated code remediation to the newly named Mend Application Security Platform.

WhiteSource, now known as To fix, is best known for his work on securing the open source software (OSS) supply chain. In February 2022, he reported finding 1,300 malicious JavaScript packages in the npm registry. Over the past few months, it has developed a Static Application Security Testing (SAST) capability to complement its existing open source Software Composition Analysis (SCA) functionality. He can now verify internally developed code as well as imported OSS.

The big new development is the addition of automated code remediation to its SAST feature and the consolidation of everything into the Mend Application Security Platform.

“We are in the midst of a massive business transformation,” said Rami Sass, co-founder and CEO of WhiteSource. safety week. “For 10 years, we have been the market leader in SCA, ie finding and managing vulnerabilities in OSS dependencies. But we recently added capabilities around static application security testing, so now we have SAST capabilities as well as SCA. It creates a comprehensive application security platform where we can now identify vulnerabilities across the entire application stack, including open source and proprietary code. Most importantly, we’ve added new features to automatically fix these vulnerabilities for you or your engineers.

He believes that these new developments are so important that they warrant a complete rebranding of the company: from WhiteSource to Mend.

The fix works by scanning the code for common weaknesses (the CWE is a list of types of software weaknesses, the presence of which could lead to a vulnerability in the code). “We review the code after it has been validated,” Sass explained. “If we find a vulnerability, we can open what is called a pull request for the developer with a suggested fix. The few lines of code we synthetically generate to fix the vulnerability for the developer would appear as a pull request for the developer. checkout for developer pending review in repository.

Mend also announced the integration of the Mend Supply Chain Defender. This detects and prevents malicious open source code from entering the code base. With this, enterprises can protect all projects that include JavaScript or Ruby OSS with a centralized policy enforcement and auditing point. All results are displayed for open source and custom code in a custom or third-party code repository for a single view in the native developer environment.

[ Read: Software Supply Chain Attacks Tripled in 2021: Study ]

For many years, vulnerabilities in open source software tended to be accidental inclusions by the OSS developer. “Over the past eighteen months or so,” Sass commented, “we have seen the emergence of a new type of vulnerability. A malicious actor – whether an individual, a group or even a state actor – would intentionally and maliciously plant vulnerabilities in OSS projects.

These implants are usually not directly in the most popular codes, but rather in transitive dependencies. “These projects are small and occupy dark corners of the open source world,” Sass continued. “Malicious actors basically plant a landmine and wait for someone to step on it.”

This is a different type of vulnerability than coding errors that can be introduced by a company’s own developers. “So we have a tool that can automatically identify the characteristics of these malicious implants in OSS and prevent them from entering your environment. It is an active supply chain protection system.

The base product was acquired with the acquisition of the Polish company Diffend. It was originally provided as a free download from WhiteSource, but is now provided as an enterprise solution by Mend.

“Attackers are increasingly targeting applications as the weakest link in attacking organizations, and at the same time the pressure to deliver software faster has never been greater. Organizations face an undeniable tension to do both, better,” Sass said. “Mend breaks the trade-off between security and development delivery times by providing a solution that automates the reduction of the software attack surface while removing the bulk of the application security burden, enabling development teams to deliver secure, high-quality code, faster.”

Related: Open Source Security Foundation now has 60 members

Related: Meta Releases Open Source Browser Extension to Verify Authenticity of Code

Related: Google Launches Database for Open Source Vulnerabilities

Related: Library dependencies and the open source supply chain nightmare

views counter

Kevin Townsend is a senior contributor to SecurityWeek. He wrote about high-tech issues long before Microsoft was born. For the past 15 years, he has specialized in information security; and has had many thousands of articles published in dozens of different magazines – from the Times and the Financial Times to current and former IT magazines.

Previous chronicles by Kevin Townsend:
Key words:


About Author

Comments are closed.