Hunted Labs Solutions for the Public Sector
What is Entercept?
Entercept is an Application Security Posture Management (ASPM) tool focused on software supply chain security. It primarily deals with pre-runtime security, helping organizations gain deeper visibility into the open-source components they use.
-
Key Features and Benefits
- Different from Traditional SCA Tools: Unlike standard Software Composition Analysis (SCA) tools, Entercept does not just match CVEs—it analyzes open-source software's actual contributors and governance.
- Bridges a Security Gap: It helps organizations understand who is behind their code, an often overlooked aspect of software supply chain security.
- Critical for Nation-State Threat Detection: By identifying potential Advanced Persistent Threats (APTs) at the source code level, Entercept provides an extra layer of defense against supply chain attacks. Stopping a new category of emerging threats: external insider threats.
- API-First Approach: The platform is designed for automation and integration into CI/CD pipelines.
-
Core Features & Capabilities
SBOM (Software Bill of Materials) Generation, Import & Analysis
- Entercept allows users to generate or import SBOMs (Software Bill of Materials) to analyze dependencies and security risks.
- It supports API-based ingestion, making it useful for integration into existing security workflows.
Dependency Analysis & Blast Radius
- The platform visualizes software dependencies through a dependency tree.
- It helps organizations understand the blast radius of a vulnerable or compromised package within their environment.
Open Source Optics (OSO) – Contributor & Threat Attribution
- One of Entercept’s unique features is its ability to track open-source maintainers and their affiliations.
- It pulls contributor data from repositories (e.g., GitHub) and flags contributors based on location, employer, and activity.
- Example: If a package maintainer is located in a sanctioned country (e.g., Russia, China), the platform flags it as a potential supply chain risk.
Threat Intelligence & Risk Assessment
- Entercept goes beyond traditional Software Composition Analysis (SCA) by identifying risk factors such as:
- Unmaintained dependencies (stale projects with inactive maintainers).
- Projects with weak security governance (e.g., no code reviews or branch protection).
- Packages controlled by groups in adversarial nations.
Automated Alternative Recommendations
- Entercept suggests alternative open-source libraries that provide similar functionality when a risky package is identified.
Continuous Monitoring & Alerting
- It tracks software packages over time and alerts users if an update introduces a new risk or threat actor.