WhiteSource changes company name to Mend
An application code security firm has expanded its repertoire and changed its name to better reflect its new capabilities. white source became To fix with the addition of automated code remediation to the newly named Mend Application Security Platform.
The big new development is the addition of automated code remediation to its SAST feature and the consolidation of everything into the Mend Application Security Platform.
“We are in the midst of a massive business transformation,” said Rami Sass, co-founder and CEO of WhiteSource. safety week. “For 10 years, we have been the market leader in SCA, ie finding and managing vulnerabilities in OSS dependencies. But we recently added capabilities around static application security testing, so now we have SAST capabilities as well as SCA. It creates a comprehensive application security platform where we can now identify vulnerabilities across the entire application stack, including open source and proprietary code. Most importantly, we’ve added new features to automatically fix these vulnerabilities for you or your engineers.
He believes that these new developments are so important that they warrant a complete rebranding of the company: from WhiteSource to Mend.
The fix works by scanning the code for common weaknesses (the CWE is a list of types of software weaknesses, the presence of which could lead to a vulnerability in the code). “We review the code after it has been validated,” Sass explained. “If we find a vulnerability, we can open what is called a pull request for the developer with a suggested fix. The few lines of code we synthetically generate to fix the vulnerability for the developer would appear as a pull request for the developer. checkout for developer pending review in repository.
[ Read: Software Supply Chain Attacks Tripled in 2021: Study ]
For many years, vulnerabilities in open source software tended to be accidental inclusions by the OSS developer. “Over the past eighteen months or so,” Sass commented, “we have seen the emergence of a new type of vulnerability. A malicious actor – whether an individual, a group or even a state actor – would intentionally and maliciously plant vulnerabilities in OSS projects.
These implants are usually not directly in the most popular codes, but rather in transitive dependencies. “These projects are small and occupy dark corners of the open source world,” Sass continued. “Malicious actors basically plant a landmine and wait for someone to step on it.”
This is a different type of vulnerability than coding errors that can be introduced by a company’s own developers. “So we have a tool that can automatically identify the characteristics of these malicious implants in OSS and prevent them from entering your environment. It is an active supply chain protection system.
The base product was acquired with the acquisition of the Polish company Diffend. It was originally provided as a free download from WhiteSource, but is now provided as an enterprise solution by Mend.
“Attackers are increasingly targeting applications as the weakest link in attacking organizations, and at the same time the pressure to deliver software faster has never been greater. Organizations face an undeniable tension to do both, better,” Sass said. “Mend breaks the trade-off between security and development delivery times by providing a solution that automates the reduction of the software attack surface while removing the bulk of the application security burden, enabling development teams to deliver secure, high-quality code, faster.”
Related: Open Source Security Foundation now has 60 members
Related: Meta Releases Open Source Browser Extension to Verify Authenticity of Code
Related: Google Launches Database for Open Source Vulnerabilities
Related: Library dependencies and the open source supply chain nightmare