In the last few weeks, we’ve released lots of new features and expanded support for different tool stacks. Most notably we’ve added support for scanning many container registries! Besides that:
We’ve added lots of new AWS rules
Autofix now also supports Python
We’ve improved our exploit reachability analysis to support PNPM
Expanding container registry support
Many containers run web-facing software such as Apache, Nginx, Python, Node.js or other runtimes. Keep them secure with docker container scanning! Next to Docker Hub, Azure Container Registry, GCP Artifact Registry & AWS Elastic Container Registry we’re now also supporting the following registries:
We've rolled out reachability analysis for PNPM lockfiles. To accomplish this at our standard of quality, we've made sure to cover many typical edge cases (aliasing, special version notation, etc.). This means our auto-triage engine gets rid of many false positives that others simply don’t.
If you’re using PNPM and using Aikido, you’re in luck! You’re using one of the only products in the industry with this level of noise reduction capabilities! 🎉
AWS rules expansion
We’ve upgraded our AWS ruleset to include more relevant rules. We want to make sure you’re notified about issues that really matter. Some new rules include:
Checking for unused IAM Credentials
SSL certificates that won't auto-renew
ECR repositories that do not auto-delete old images.
With Aikido’s Autofix feature, you can create pull requests to fix vulnerabilities with just one click. We now also support Python! (Currently, this only applies to environments using requirements.txt, but not yet for poetry.lock files.) There’s nothing extra to configure. Just browse to a Python issue and find the Autofix button!