Aikido

Protect every install without slowing down your developers

Block malicious browser extensions, IDE plugins, and code libraries. Endpoint Protection gives you visibility and control over the software packages installed on your dev's devices.

Your data won't be shared · No CC required
Trusted by 50k+ orgs
|
Loved by 100k+ devs
|
4.7/5

Developer devices are under attack

Option 1) Lock everything down
Private registries. Approval queues. Weeks of friction, while developers route around it.
Option 2) Do nothing
Leave developer workstations unsecured, risk leaking credentials, tokens, and source code.
Option 3) Aikido Endpoint Protection
See and govern what runs on each device. Block attacks automatically.
HOW IT WORKS

Aikido Endpoint protects developer devices from supply chain attacks

Discover risk

Every package, extension, plug-in, and install gets reviewed by Aikido. See what's on every machine.

Prevent attacks

Malicious installs are blocked before they touch the device. Prevent attacks before they happen.

Enable developers

Set team policies, exceptions, and approval flows. Keep developers building.

SOURCES

Full coverage across developer ecosystems

Package Registries

NPM
Maven
PyPi
NuGet
Ruby
(Soon)
Go
(Soon)
Rust
(Soon)
PhP
(Soon)

IDE & Browser Extensions

JetBrains
VS 
Code
OpenVSX
Firefox
Visual
Studio
Chrome
Cursor
Windsurf

AI Tools & Models

Gemini
OpenAI
Github
Copilot
xAI
MCP
Servers
Claude Code
Skills.sh

" It's not a case of people deploying insecure code to production anymore; even at install they're getting GitHub credentials exposed. You need something on the device that can stop it before things are installed, not just deployed. Aikido Endpoint is a real game changer. "

Gavin WilliamsEngineering Manager at Omnea

CAPABILITIES

Control device installs from one place

Real-time malware blocking

Aikido actively detects and blocks malware before it hits the device

Extension governance

Scan and control IDE and browser extensions installed by developers. Block malicious extensions automatically.

Continuous monitoring

Check every install as it happens and after. If something turns bad, you know.

Group-based policies

Set different policies for different teams. Developers get flexibility, security teams get control.

Request & approval workflow

Route team requests, define exceptions, and accept new installs in one click

Bulk actions

Block, uninstall, or adjust policies across devices in one click. No need to chase individual devices.

SETUP

Get up and running in a few minutes

Step 1

Deploy to workstations

Deploy through the MDMs like Jamf, Fleet, or Iru. No new infrastructure. Manage global and team-level permissions in the Aikido platform.

Step 2

Configure teams and ecosystems

Choose which registries and marketplaces to monitor. Set minimum package age, allowlists, blocklists, and approval workflows. Apply different rules to different teams.

Step 3

Monitor devices and take action

See every package, extension, and install across team devices. Manage requests and inspect activity from one place.

AIKIDO INTEL

Powered by our threat intelligence engine

Aikido Intel monitors the open internet, detecting malware in open-source ecosystems within minutes.

Supported by a dedicated team of security researchers and AI engineers.
View our Intel feed

Protect every install. Build fearlessly.

Developer devices are prime targets, secure yours.

Faq

Frequently Asked Questions

How are malicious packages detected?

Every package published to npm, PyPI, and other registries is scanned automatically by Aikido Intel using a combination of static analysis, behavioral rules, and AI. Suspicious packages are flagged and reviewed by Aikido's in-house research team. Confirmed threats are pushed to every connected workstation in real time. For a live view of what we're detecting, visit the Aikido Intel feed.

How does Aikido Endpoint compare to using a private registry (for example, NuGet)?

Aikido Endpoint provides broader protection across many ecosystems, while a private registry is best when you need tight control within one specific ecosystem.

How does Aikido Endpoint work technically?

It intercepts HTTP traffic at the kernel level, including TLS-encrypted traffic by adding a local CA, and it is designed to work in a chain with other traffic inspection solutions.

More in depth info: https://help.aikido.dev/aikido-endpoint-protection/miscellaneous-aikido-endpoint/how-does-endpoint-protection-work

How does Aikido interact with our existing EDR?

Aikido Endpoint operates at the package, extension, and AI layer. It complements EDR rather than replacing it. EDR catches threats after they are running. Aikido stops them from running in the first place.

How is this different from blocking AI tools at the network level?

Network blocks are coarse and easy to route around. A developer on a personal hotspot can bypass them entirely. Aikido operates at the workstation level, per developer, per tool. You get granular control and a real audit trail.

What is minimum package age and why does it matter?

Minimum package age holds installs of recently published packages. The default is 48 hours. This stops a common supply chain attack. An attacker publishes malicious code to npm or PyPI and tries to get developers to install it before the community can flag it.

What ecosystems are covered?

We are constantly adding new ecosystem coverage. You can find the current coverage in-app or in the docs.

What if developers use personal accounts or consumer AI tools?

Aikido observes traffic at the workstation level regardless of which account a developer is using. If a tool is making outbound calls to an AI service, Aikido sees it. This is true whether it is a corporate license or a personal account.

Does Aikido's endpoint protection have Windows and Linux support?

Windows and Linux support will be available in Q2 2026.

What is the difference between Endpoint and a virus scanner like Nortons?

Traditional virus scanners such as Norton, McAfee, and Crowdstrike Falcon primarily inspect compiled binaries for known malware signatures, while Aikido Endpoint focuses on the modern, non-binary attack surface, including JavaScript packages, IDE extensions, browser plugins, and AI skills marketplaces. These plain-text, interpreted artifacts can slip past traditional scanners, yet still run with full access to the developer environment and, by extension, the software supply chain.