Product
Everything you need to secure code, cloud, and runtime– in one central system
Code
Dependencies
Prevent open-source risks (SCA)
Secrets
Catch exposed secrets
SAST
Secure code as its written
Container Images
Secure images easily
Malware
Prevent supply chain attacks
Infrastructure as Code
Scan IaC for misconfigurations
License Risk & SBOMs
Avoid risk, be compliant
Outdated Software
Know your EOL runtimes
Cloud
Cloud / CSPM
Cloud misconfigurations
DAST
Black-box security testing
API Scanning
Test your API’s for vulns
Virtual Machines
No agents, no overhead
Kubernetes Runtime
soon
Secure your container workloads
Cloud Inventory
Cloud sprawl, solved
Defend
Runtime Protection
In-app Firewall / WAF
Features
AI AutoFix
1-click fixes with Aikido AI
CI/CD Security
Scan before merge and deployment
IDE Integrations
Get instant feedback while coding
On-Prem Scanner
Compliance-first local scanning
Solutions
Use Cases
Compliance
Automate SOC 2, ISO & more
Vulnerability Management
All-in-1 vuln management
Secure Your Code
Advanced code security
Generate SBOMs
1 click SCA reports
ASPM
End-to-end AppSec
AI at Aikido
Let Aikido AI do the work
Block 0-Days
Block threats before impact
Industries
FinTech
HealthTech
HRTech
Legal Tech
Group Companies
Agencies
Startups
Enterprise
Mobile apps
Manufacturing
Pricing
Resources
Developer
Docs
How to use Aikido
Public API docs
Aikido developer hub
Changelog
See what shipped
Security
In-house research
Malware & CVE intelligence
Glossary
Security jargon guide
Trust Center
Safe, private, compliant
Open Source
Aikido Intel
Malware & OSS threat feed
Zen
In-app firewall protection
OpenGrep
Code analysis engine
Integrations
IDEs
CI/CD Systems
Clouds
Git Systems
Compliance
Messengers
Task Managers
More integrations
About
About
About
Meet the team
Careers
We’re hiring
Press Kit
Download brand assets
Calendar
See you around?
Open Source
Our OSS projects
Blog
The latest posts
Customer Stories
Trusted by the best teams
Contact
Login
Start for Free
No CC required
Aikido
Menu
Aikido
EN
EN
FR
JP
Login
Start for Free
No CC required
Blog
/
Meet Intel: Aikido’s Open Source threat feed powered by LLMs.

Meet Intel: Aikido’s Open Source threat feed powered by LLMs.

By
Mackenzie Jackson
Mackenzie Jackson
4 min read
Engineering
Aikido Launches Intel - open-source security threat feed

Intel is our open-source security threat feed powered by AI and our in-house research team. Intel monitors and uncovers vulnerabilities in open-source packages before they are disclosed. Many never are.

67% of software vulnerabilities silently patched were never disclosed

Open-source software powers the world, literally. However, open-source security is also an area of huge security concern. Open-source tools, like everything else, can introduce security vulnerabilities. These can be used by attackers to exploit your application. Leaving software vendors open to attacks through no fault of their own. This makes open-source security a very important topic.

Not only do we rely on the open-source community to build and maintain these tools, we also rely on them to fix any known security vulnerabilities. Importantly we also rely on these maintainers to publicly report the vulnerabilities when they are discovered. Public disclosure of vulnerabilities from the community forms the foundation of open-source security.

Silent patching, or shadow patching, is when a security fix is applied (patched) but never disclosed. This is a big issue because it means vendors may be running vulnerable software without them being aware of the risk.

We are launching Aikido Intel to bring out of the shadows silently patched software that could affect you. With Aikido Intel, we can give developers the earliest possible warning if we find vulnerabilities that may affect them and improve open-source security.

What is Aikido Intel?

Aikido Intel is an initiative by AI + our in-house research team to improve open-source security by discovering vulnerabilities in the open-source supply chain at the earliest possible moment. Even before they get disclosed in a vulnerability database. To achieve this we use custom-trained LLMs to review changes in packages and identify when a security issue has been fixed.

Like all software, open-source keeps a change log of what has been adjusted on each new version. Intel uses AI to read all these public change logs and release notes to find examples of where security issues have been patched. That is then matched against 5 vulnerability databases to see if the issue has been reported. If not we get a security engineer to analyze and evaluate the vulnerability assigning it an Aikido Vulnerability number and severity and publicly announcing it so you know if you are affected. Read more details about this later on

Checkout Aikido Intel now

scanning packages for open-source security

Aikido Intel by numbers

Since launching in January Aikido, Intel has discovered 511 vulnerabilities that were patched but not disclosed publicly presenting a real threat to anyone using those packages.

Vulnerabilities discovered in open-source projects

Sometimes it can take time between patching a vulnerability and getting a CVE number assigned to the issue. Each week Aikido re-evaluates the status of previous vulnerabilities to see if any have a CVE assigned. We can disclose that 67% of the vulnerabilities we discovered were never publically disclosed to any vulnerability database!

While it is no surprise that low severity vulnerabilities are more frequently silently patched, it is still shocking that over 50% of high and critical vulnerabilities are never disclosed. This creates a huge blind spot for developers and software vendors.

Now I know some of you will be squirming in your seats saying that perhaps these are small, not so popular, open-source projects with limited security policies, but actually, you would be wrong. We found some undisclosed vulnerabilities in some very large projects. .

Axios a promise-based HTTP client for the browser and node.js with 56 million weekly downloads and 146,000 + dependents fixed a vulnerability for prototype pollution in January 2024 that has never been publicly disclosed.

Fun fact about this vulnerability: This was actually the first vulnerability Aikido Intel found (See number 2023-10001)…. It remains undisclosed to this day!

Now I don’t want to hand it to them, Axios is not alone, there are a few other names that deserve a special shout-out. Apache silently patched a vulnerability in the echarts software for cross-site scripting that was never disclosed.

Aikido Vulnerability Echarts
\

Another interesting example we discovered was a critical path traversal vulnerability in the Chainlit that was patched in September but the vulnerability was never publically disclosed.

The most common vulnerabilities

Cross-site scripting was the most common undisclosed vulnerability accounting for 14.8% next to exposure of sensitive information 12.3%. Overall we detected 90 different types of vulnerabilities creating a long tail of results, below are some of the most common.

The most common vulnerabilities discovered

Most common vulnerabilities - open-source security

If we look just at the cuticle and high vulnerabilities we can see a slightly different picture with remote code execution taking the number one spot on the list

The most common vulnerabilities discovered - Critical and High only

Most common vulneribilities - High and Critical

Time to disclosure

While at the time of writing this  67% of packages never disclosed their vulnerabilities, 31% did, be that from the maintainers or security researchers (kudos to them). Of the packages that did disclose the vulnerabilities, it took an average of 27 days from the time the patch was released to when a CVE was assigned. The fastest time we observed was just 1 day and the longest time was 9 months!

How Intel works (in detail)

I know we are all sick of the new AI bullsh*t, but Intel is an initiative from Aikido’s security research team and Aikido's AI team leverages AI with a Human in The Loop to provide a public threat feed to improve open-source security.

Intel works by reading through all the publicly available changelogs and release notes to understand if security fixes have been made but not disclosed.  To achieve this, two LLM models are used, one for filtering the data, and removing all unnecessary context so the second LLM can focus on vulnerability analysis. A human security engineer then reviews the discoveries of the LLM, validates the findings, and releases an Intel when a vulnerability is confirmed.

This is such an effective method because it consumes remarkably less computational power than trying to scan all these systems for vulnerabilities. Yet, it has proven over a year to find many true results.

How Changelogs Are Viewed by Aikido Intel

Changelogs are documents maintained in open-source projects that record updates, bug fixes, feature additions, and patches. Examples include CHANGELOG.md files, commit messages, and GitHub release notes.

The Intel LLM identifies entries suggesting security-related changes by looking for:

  • Keywords: “vulnerability,” “security,” “fix,” “exploit,” “input validation,” etc.
  • Contextual cues: “Fixed a critical bug,” “Patched a buffer overflow,” “Resolved authentication issues.”

Example Entries Flagged by the LLM:
- Fixed an input sanitization issue in the login handler.
- Resolved a memory leak that could lead to denial-of-service attacks.
- Addressed a path traversal vulnerability in file upload functionality.

Open-source security, how vulnerabilities are disclosed properly

As stated earlier, public disclosed is a big component of open-source security. Several different databases are used to disclose when a software has a vulnerability inside it. The main database is the National Vulnerability Database (NVD) which the US government maintains. This database is not only used by companies to check their supplychain but also by security software that checks projects against this database and others (SCA software). There are multiple other databases including Mitre’s Common Vulnerabilities and Exposures database (CVE), GitHub Advisory Database, and many more, in total Aikido checks against 5 different databases. But what most of these databases have in common is that they require vulnerabilities to be publicly disclosed, usually after a fix has been released.

Infogram

Why are vulnerabilities not disclosed?

This is a good question and I want to start by saying there is no good reason not to disclose vulnerabilities. Perhaps the most common is reputational risk, that your software may be viewed as insecure, but I would argue there is much more to lose from not disclosing than disclosing.

Copy: Untitled designInfogram

Why shadow patching is a problem for open-source security

Not publicly disclosing vulnerabilities in your software creates a huge risk for your users. As the saying goes, if it isn't broken don’t fix it, this applies quite often to software.

Updating components of your software can often create issues in performance, and usability or simply break your application, with this in mind it's not always common practice to immediately update packages when a newer version is available.

When, however, there is a security issue in a component it is important to know as it changes the urgency in which you update your open-source and third-party components. Not disclosing this information means users are less likely to update meaning they will have security flaws in their tools they didn’t know about, hence why shadow patching is such a problem.

Don’t let hidden vulnerabilities compromise your security.

Partner with Aikido Security today to protect your supply chain and gain peace of mind.

Written by Mackenzie Jackson

Share:

https://www.aikido.dev/blog/meet-intel-aikidos-open-source-threat-feed-powered-by-llms

Table of contents:
Text Link
Share:
Use keyboard
Use left key to navigate previous on Aikido slider
Use right arrow key to navigate to the next slide
to navigate through articles
By
Charlie Eriksen

You're Invited: Delivering malware via Google Calendar invites and PUAs

Malware
May 13, 2025
Read more
By
Mackenzie Jackson

Why Updating Container Base Images is So Hard (And How to Make It Easier)

Engineering
May 12, 2025
Read more
By
Charlie Eriksen

RATatouille: A Malicious Recipe Hidden in rand-user-agent (Supply Chain Compromise)

May 6, 2025
Read more
By
Charlie Eriksen

XRP supply chain attack: Official NPM package infected with crypto stealing backdoor

Malware
April 22, 2025
Read more
By
Charlie Eriksen

The malware dating guide: Understanding the types of malware on NPM

Malware
April 10, 2025
Read more
By
Charlie Eriksen

Hide and Fail: Obfuscated Malware, Empty Payloads, and npm Shenanigans

Malware
April 3, 2025
Read more
By
Madeline Lawrence

Launching Aikido Malware – Open Source Threat Feed

News
March 31, 2025
Read more
By
Charlie Eriksen

Malware hiding in plain sight: Spying on North Korean Hackers

March 31, 2025
Read more
By
The Aikido Team

Top Cloud Security Posture Management (CSPM) Tools in 2025

Guides
March 27, 2025
Read more
By
Madeline Lawrence

Get the TL;DR: tj-actions/changed-files Supply Chain Attack

News
March 16, 2025
Read more
By
Mackenzie Jackson

A no-BS Docker security checklist for the vulnerability-minded developer

Guides
March 6, 2025
Read more
By
Mackenzie Jackson

Sensing and blocking JavaScript SQL injection attacks

Guides
March 4, 2025
Read more
By
Floris Van den Abeele

Prisma and PostgreSQL vulnerable to NoSQL injection? A surprising security risk explained

Engineering
February 14, 2025
Read more
By
The Aikido Team

Top Dynamic Application Security Testing (DAST) Tools in 2025

Guides
February 12, 2025
Read more
By
Willem Delbare

Launching Opengrep | Why we forked Semgrep

News
January 24, 2025
Read more
By
Thomas Segura

Your Client Requires NIS2 Vulnerability Patching. Now What?

January 14, 2025
Read more
By
Mackenzie Jackson

Top 10 AI-powered SAST tools in 2025

Guides
January 10, 2025
Read more
By
Madeline Lawrence

Snyk vs Aikido Security | G2 Reviews Snyk Alternative

Guides
January 10, 2025
Read more
By
Mackenzie Jackson

Top 10 Software Composition Analysis (SCA) tools in 2025

Guides
January 9, 2025
Read more
By
Michiel Denis

3 Key Steps to Strengthen Compliance and Risk Management

December 27, 2024
Read more
By
Mackenzie Jackson

The Startup's Open-Source Guide to Application Security

Guides
December 23, 2024
Read more
By
Madeline Lawrence

Launching Aikido for Cursor AI

Engineering
December 13, 2024
Read more
By
Johan De Keulenaer

Aikido joins the AWS Partner Network

News
November 26, 2024
Read more
By
Mackenzie Jackson

Command injection in 2024 unpacked

Engineering
November 24, 2024
Read more
By
Mackenzie Jackson

Path Traversal in 2024 - The year unpacked

Engineering
November 23, 2024
Read more
By
Mackenzie Jackson

Balancing Security: When to Leverage Open-Source Tools vs. Commercial Tools

Guides
November 15, 2024
Read more
By
Mackenzie Jackson

The State of SQL Injection

Guides
November 8, 2024
Read more
By
Michiel Denis

Visma’s Security Boost with Aikido: A Conversation with Nikolai Brogaard

News
November 6, 2024
Read more
By
Michiel Denis

Security in FinTech: Q&A with Dan Kindler, co-founder & CTO of Bound

News
October 10, 2024
Read more
By
Felix Garriau

Top 7 ASPM Tools in 2025

Guides
October 1, 2024
Read more
By
Madeline Lawrence

Automate compliance with SprintoGRC x Aikido

News
September 11, 2024
Read more
By
Felix Garriau

How to Create an SBOM for Software Audits

Guides
September 9, 2024
Read more
By
Madeline Lawrence

SAST vs DAST: What you need to know.

Guides
September 2, 2024
Read more
By
Felix Garriau

Best SBOM Tools for Developers: Our 2025 Picks

Guides
August 7, 2024
Read more
By
Lieven Oosterlinck

5 Snyk Alternatives and Why They Are Better

News
August 5, 2024
Read more
By
Madeline Lawrence

Why we’re stoked to partner with Laravel

News
July 8, 2024
Read more
By
Felix Garriau

110,000 sites affected by the Polyfill supply chain attack

News
June 27, 2024
Read more
By
Felix Garriau

Cybersecurity Essentials for LegalTech Companies

News
June 25, 2024
Read more
By
Roeland Delrue

Drata Integration - How to Automate Technical Vulnerability Management

Guides
June 18, 2024
Read more
By
Joel Hans

DIY guide: ‘Build vs buy’ your OSS code scanning and app security toolkit

Guides
June 11, 2024
Read more
By
Roeland Delrue

SOC 2 certification: 5 things we learned

Guides
June 4, 2024
Read more
By
Joel Hans

Top 10 app security problems and how to protect yourself

Guides
May 28, 2024
Read more
By
Madeline Lawrence

We just raised our $17 million Series A

News
May 2, 2024
Read more
By

Best RASP Tools for Developers in 2025

April 10, 2024
Read more
By
Willem Delbare

Webhook security checklist: How to build secure webhooks

Guides
April 4, 2024
Read more
By
Willem Delbare

The Cure For Security Alert Fatigue Syndrome

Engineering
February 21, 2024
Read more
By
Roeland Delrue

NIS2: Who is affected?

Guides
January 16, 2024
Read more
By
Roeland Delrue

ISO 27001 certification: 8 things we learned

Guides
December 5, 2023
Read more
By
Roeland Delrue

Cronos Group chooses Aikido Security to strengthen security posture for its companies and customers

News
November 30, 2023
Read more
By
Bart Jonckheere

How Loctax uses Aikido Security to get rid of irrelevant security alerts & false positives

News
November 22, 2023
Read more
By
Felix Garriau

Aikido Security raises €5m to offer a seamless security solution to growing SaaS businesses

News
November 9, 2023
Read more
By
Roeland Delrue

Aikido Security achieves ISO 27001:2022 compliance

News
November 8, 2023
Read more
By
Felix Garriau

How StoryChief’s CTO uses Aikido Security to sleep better at night

News
October 24, 2023
Read more
By
Willem Delbare

What is a CVE?

Guides
October 17, 2023
Read more
By
Felix Garriau

Best Tools for End-of-Life Detection: 2025 Rankings

Guides
October 4, 2023
Read more
By
Willem Delbare

Top 3 web application security vulnerabilities in 2024

Engineering
September 27, 2023
Read more
By
Felix Garriau

New Aikido Security Features: August 2023

News
August 22, 2023
Read more
By
Felix Garriau

Aikido’s 2025 SaaS CTO Security Checklist

News
August 10, 2023
Read more
By
Felix Garriau

Aikido’s 2024 SaaS CTO Security Checklist

News
August 10, 2023
Read more
By
Felix Garriau

15 Top Cloud and Code Security Challenges Revealed by CTOs

Engineering
July 25, 2023
Read more
By
Willem Delbare

What is OWASP Top 10?

Guides
July 12, 2023
Read more
By
Willem Delbare

How to build a secure admin panel for your SaaS app

Guides
July 11, 2023
Read more
By
Roeland Delrue

How to prepare yourself for ISO 27001:2022

Guides
July 5, 2023
Read more
By
Willem Delbare

Preventing fallout from your CI/CD platform being hacked

Guides
June 19, 2023
Read more
By
Felix Garriau

How to Close Deals Faster with a Security Assessment Report

News
June 12, 2023
Read more
By
Willem Delbare

Automate Technical Vulnerability Management [SOC 2]

Guides
June 5, 2023
Read more
By
Willem Delbare

Preventing prototype pollution in your repository

Guides
June 1, 2023
Read more
By
Willem Delbare

How does a SaaS startup CTO balance development speed and security?

Guides
May 16, 2023
Read more
By
Willem Delbare

How a startup’s cloud got taken over by a simple form that sends emails

Engineering
April 10, 2023
Read more
By
Felix Garriau

Aikido Security raises €2 million pre-seed round to build a developer-first software security platform

News
January 19, 2023
Read more
By

Why Lockfiles Matter for Supply Chain Security

Read more
Top Cloud Security Posture Management (CSPM) Tools in 2025
By
The Aikido Team

Top Cloud Security Posture Management (CSPM) Tools in 2025

Guides
May 14, 2025
Top Dynamic Application Security Testing (DAST) Tools in 2025
By
The Aikido Team

Top Dynamic Application Security Testing (DAST) Tools in 2025

Guides
May 14, 2025
XRP supply chain attack: Official NPM package infected with crypto stealing backdoor
By
Charlie Eriksen

XRP supply chain attack: Official NPM package infected with crypto stealing backdoor

Malware
March 31, 2025

Get secure in 32 seconds

Connect your GitHub, GitLab, Bitbucket or Azure DevOps account to start scanning your repos for free.

Start for Free
Your data won't be shared · Read-only access
Aikido dashboard
Company
ProductPricingAboutCareersContactPartner with us
Resources
DocsPublic API DocsVulnerability DatabaseBlogIntegrationsGlossaryPress KitCustomer Reviews
Security
Trust CenterSecurity OverviewChange Cookie Preferences
Legal
Privacy PolicyCookie PolicyTerms of UseMaster Subscription AgreementData Processing Agreement
Use Cases
ComplianceSAST & DASTASPMVulnerability ManagementGenerate SBOMsWordPress SecuritySecure Your CodeAikido for Microsoft
Industries
For HealthTechFor MedTechFor FinTechFor SecurityTechFor LegalTechFor HRTechFor AgenciesFor EnterpriseFor PE & Group Companies
Compare
vs All Vendorsvs Snykvs Wizvs Mendvs Orca Securityvs Veracodevs GitHub Advanced Securityvs GitLab Ultimatevs Checkmarxvs Semgrepvs SonarQube
Connect
hello@aikido.dev
LinkedInX
Subscribe
Stay up to date with all updates
Not quite there yet.
👋🏻 Thank you! You’ve been subscribed.
Team Aikido
Not quite there yet.
© 2025 Aikido Security BV | BE0792914919
🇪🇺 Registered address: Coupure Rechts 88, 9000, Ghent, Belgium
🇪🇺 Office address: Gebroeders van Eyckstraat 2, 9000, Ghent, Belgium
🇺🇸 Office address: 95 Third St, 2nd Fl, San Francisco, CA 94103, US
SOC 2
Compliant
ISO 27001
Compliant