Internet Explorer is no longer supported. Many things will still work, but your experience will be degraded and some things won't function. Please use a modern browser such as Edge, Chrome, or Firefox.

Welcome to Inedo Security Labs

Established in 2023, we're a team of security researchers that work closely with Inedo's product engineers, solution architects, and leadership to improve Software Supply Chain Security for our customers and beyond. We accomplish this through research (some of which is published in our SecLib), as well as advisory and consulting services.

We also curate the ProGet Vulnerability Database (PGVD), which is an aggregation of publicly-disclosed vulnerabilities from a variety of sources and malicious packages we've detected. In addition, we'll do easy-to-understand write-ups of prominent vulnerabilities, so that you don't have to be a security researcher yourself to learn how to protect yourself.

  • 152761
    Detected
    Vulnerabilities
  • 231171
    Malicious
    Packages
  • 9774
    Vulnerability
    Write-ups
  • 25
    Weakness
    Write-ups

Latest Vulnerabilities Detected

CVSS ScoreVulnerability IDSummaryPackage
7.3PGV-2589502

RHSA-2025:22729: xorg-x11-server security update (Moderate)

xorg-x11-server-common x86_64, xorg-x11-server-Xdmx x86_64, xorg-x11-server-Xephyr x86_64, xorg-x11-server-Xnest x86_64, xorg-x11-server-Xorg x86_64, xorg-x11-server-Xvfb x86_64, xorg-x11-server-Xwayland x86_64 (rpm)

6.4PGV-258939J

mcp-server-kubernetes has potential security issue in exec_in_pod tool

mcp-server-kubernetes (npm)

10.0PGV-258939I

React Server Components are Vulnerable to RCE

react-server-dom-parcel, react-server-dom-turbopack, react-server-dom-webpack (npm)

10.0PGV-258939G

Next.js is vulnerable to RCE in React flight protocol

next (npm)

6.9PGV-2589347

Rhino has high CPU usage and potential DoS when passing specific numbers to `toFixed()` function

org.mozilla/rhino (maven)

Meet the Inedo Security Labs Team

We're a small but focused team that reports directly to Inedo's CEO, Alex Papadimoulis. Our experience is diverse and over a range of domains and technologies, from Java in the banking sector to legacy Windows systems in mining, and advancements in cloud-native and machine learning. And although we're new to the Inedo team, we started with a ton of experience in Inedo's products.

Our Analysts

Pete Barnum
Senior Security Analyst
Pete has a background in regulatory compliance, with a focus on cybersecurity, SDLC auditing, risk management, disaster recovery, and IT vendor management. He's worked the Banking, Logistics, and Government sectors... but not yet the live/traveling entertainment industry.
Kim Pento
Chief Security Researcher
As Chief Security Researcher at Inedo Security Labs, Kim leverages her 20 years of expertise in cybersecurity in highly regulated sectors, oversees the team, and was a key figure alongside Alex Papadimoulis, CEO of Inedo, in the establishment of Inedo Security Labs.
Tod Hoven
Security Analyst
Tod is a former product engineer of ProGet transitioned into a career as a security researcher. Interested in analyzing and dissecting various software and systems to discover potential vulnerabilities and threats, vulnerability assessment, penetration testing, and threat modeling.