Hunted Labs Solutions for the Public Sector

What is Entercept?

Entercept is an Application Security Posture Management (ASPM) tool focused on software supply chain security. It primarily deals with pre-runtime security, helping organizations gain deeper visibility into the open-source components they use.

  • Key Features and Benefits
    • Different from Traditional SCA Tools: Unlike standard Software Composition Analysis (SCA) tools, Entercept does not just match CVEs—it analyzes open-source software's actual contributors and governance.
    • Bridges a Security Gap: It helps organizations understand who is behind their code, an often overlooked aspect of software supply chain security.
    • Critical for Nation-State Threat Detection: By identifying potential Advanced Persistent Threats (APTs) at the source code level, Entercept provides an extra layer of defense against supply chain attacks. Stopping a new category of emerging threats: external insider threats.
    • API-First Approach: The platform is designed for automation and integration into CI/CD pipelines.
  • Core Features & Capabilities

    ​​​​SBOM (Software Bill of Materials) Generation, Import & Analysis

    • ​​​​​​​​​​​​​​Entercept allows users to generate or import SBOMs (Software Bill of Materials) to analyze dependencies and security risks.
    • It supports API-based ingestion, making it useful for integration into existing security workflows.​​​​​​​

    Dependency Analysis & Blast Radius

    • The platform visualizes software dependencies through a dependency tree.
    • It helps organizations understand the blast radius of a vulnerable or compromised package within their environment.

    Open Source Optics (OSO) – Contributor & Threat Attribution

    • One of Entercept’s unique features is its ability to track open-source maintainers and their affiliations.
    • It pulls contributor data from repositories (e.g., GitHub) and flags contributors based on location, employer, and activity.
    • Example: If a package maintainer is located in a sanctioned country (e.g., Russia, China), the platform flags it as a potential supply chain risk.

    Threat Intelligence & Risk Assessment

    • Entercept goes beyond traditional Software Composition Analysis (SCA) by identifying risk factors such as:
      • Unmaintained dependencies (stale projects with inactive maintainers).
      • Projects with weak security governance (e.g., no code reviews or branch protection).
      • Packages controlled by groups in adversarial nations.​​​​​​​​​​​​

    Automated Alternative Recommendations

    • Entercept suggests alternative open-source libraries that provide similar functionality when a risky package is identified.

    Continuous Monitoring & Alerting

    • It tracks software packages over time and alerts users if an update introduces a new risk or threat actor.