dpndncY
dpndncY
Features Platform How It Works Integrations Why dpndncY? Product Tour Engine Demo Download Docs Partners Get Early Access
Use cases

Block typosquats. Stop takeovers. Sign every decision.

The Dependency Firewall plugs into the workflows you already have — package managers, SCM, IDE, CI/CD, ticketing, chat. Every team in the release path gets the same evidence trail; each role consumes a different view of it.

Supply chain attacks
Block typosquats and package takeovers at install time
Trust-delta gating fires when a package's trust score drops vs. the last approved version — the signal that catches takeovers and lookalikes that absolute thresholds miss. The firewall blocks the install before the malicious code lands.
Active exploitation
CISA KEV-listed packages refused at install
When CISA publishes a new KEV entry, the firewall starts refusing installs of the affected version automatically. Existing dependents are flagged with Patch Now (48h SLA) decisions, signed and exported.
Audit & compliance
Cryptographically verifiable evidence for every decision
Every allow / block / bypass / Patch-Now / Accept-Risk decision carries a JWS attestation with rationale and signal evidence. Auditors verify offline with the dpndncY public key — strictly better than a PDF report template.
Air-gapped environments
Self-hosted firewall, no cloud dependency
Government contractors, defense, regulated finance, healthcare. The firewall runs on-prem; package vulnerability data is mirrored locally. Install-time decisions happen against a local proxy — no external network access required at runtime.
Polyglot codebases
One firewall across npm, PyPI, Maven, NuGet, RubyGems, Cargo, Go
One policy, one evidence format, one operator UI — whether your team installs via npm, pip, Maven, NuGet, gem, cargo, or go. SAST and IaC scanning in the same platform across 13+ languages.
License legal review
Block GPL contamination before it lands
License obligations engine surfaces the actual obligations triggered by each license — copyleft scope, attribution, source disclosure, NOTICE file requirements. Pre-install enforcement keeps incompatible licenses out of the tree to begin with.
Same data, role-specific view
Developers & DevOps
Ship faster, ship safer
Configure your package manager once; the firewall handles the rest. Auto-fix PRs cover 9 manifest types and 7 lockfile formats with breaking-change analysis. CLI for any CI/CD pipeline. VS Code extension for inline diagnostics.
AppSec & Security
Pre-install enforcement, not post-scan triage
Multi-signal decisioning (KEV, EPSS, ExploitDB, reachability, attack-path, trust-delta) drives both firewall blocks and post-scan prioritization. Decision-engine assigns SLA-bound triage outcomes with rationale. Signed evidence on everything.
CISOs & Leadership
Auditor-grade evidence by default
Every decision the firewall makes — and every Patch-Now or Accept-Risk decision the platform makes — produces a signed JWS attestation. Trend snapshots show risk-over-time. Compliance evidence map covers SOC 2, ISO 27001, PCI-DSS controls.

Block them before they're installed.

Snyk finds them after. dpndncY blocks them before — and signs the proof. Self-hosted, multi-tenant, with the deepest exploitability stack on the market.