<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
  <channel>
    <title>DepOversight blog</title>
    <link>https://depoversight.com/blog/</link>
    <description>Field notes on dependency security, supply-chain incidents, and what we surface before disclosure.</description>
    <language>en</language>
    <atom:link href="https://depoversight.com/rss.xml" rel="self" type="application/rss+xml" />
    <item>
      <title>Dependency intelligence vs vulnerability scanning</title>
      <link>https://depoversight.com/blog/dependency-intelligence-vs-vulnerability-scanning/</link>
      <guid isPermaLink="true">https://depoversight.com/blog/dependency-intelligence-vs-vulnerability-scanning/</guid>
      <pubDate>Sat, 09 May 2026 00:00:00 GMT</pubDate>
      <description>Two complementary tools, two different questions. A factual breakdown of what each one is built to answer, and where the boundary sits.</description>
      <category>comparison</category>
      <category>vulnerability-scanning</category>
      <category>dependency-intelligence</category>
    </item>
    <item>
      <title>What is pre-CVE dependency risk?</title>
      <link>https://depoversight.com/blog/what-is-pre-cve-dependency-risk/</link>
      <guid isPermaLink="true">https://depoversight.com/blog/what-is-pre-cve-dependency-risk/</guid>
      <pubDate>Sat, 09 May 2026 00:00:00 GMT</pubDate>
      <description>A working definition for the class of dependency risk that exists before, and sometimes instead of, a CVE. The categories, the signals, and what review actually looks like.</description>
      <category>pre-cve</category>
      <category>definitions</category>
      <category>supply-chain</category>
      <category>fundamentals</category>
    </item>
    <item>
      <title>Why CVE scanners are not early-warning systems</title>
      <link>https://depoversight.com/blog/cve-scanners-not-early-warning/</link>
      <guid isPermaLink="true">https://depoversight.com/blog/cve-scanners-not-early-warning/</guid>
      <pubDate>Fri, 08 May 2026 00:00:00 GMT</pubDate>
      <description>CVE scanners are good at one job, telling you which dependencies match a published advisory. That job ends where the most expensive incidents begin.</description>
      <category>cve</category>
      <category>vulnerability-management</category>
      <category>supply-chain</category>
    </item>
    <item>
      <title>Dependabot, OSV, and CVE scanners: what they miss before disclosure</title>
      <link>https://depoversight.com/blog/dependabot-osv-cve-scanners-pre-disclosure/</link>
      <guid isPermaLink="true">https://depoversight.com/blog/dependabot-osv-cve-scanners-pre-disclosure/</guid>
      <pubDate>Thu, 07 May 2026 00:00:00 GMT</pubDate>
      <description>Three of the most-deployed dependency-security tools, all built around the same data flow. A factual look at what each one is, what they do well, and the shared blind spot, the pre-advisory window.</description>
      <category>comparison</category>
      <category>dependabot</category>
      <category>osv</category>
      <category>cve-scanners</category>
    </item>
    <item>
      <title>What an OpenSSF Scorecard score actually measures</title>
      <link>https://depoversight.com/blog/openssf-scorecard-explained/</link>
      <guid isPermaLink="true">https://depoversight.com/blog/openssf-scorecard-explained/</guid>
      <pubDate>Wed, 06 May 2026 00:00:00 GMT</pubDate>
      <description>Scorecard reduces 19+ structural risk checks to a single 0–10 number. Useful when you understand what is in the score, misleading when you do not.</description>
      <category>openssf</category>
      <category>scorecard</category>
      <category>fundamentals</category>
    </item>
    <item>
      <title>Silent patches: the security fixes nobody tells you about</title>
      <link>https://depoversight.com/blog/silent-patches/</link>
      <guid isPermaLink="true">https://depoversight.com/blog/silent-patches/</guid>
      <pubDate>Tue, 05 May 2026 00:00:00 GMT</pubDate>
      <description>A non-trivial fraction of security-relevant fixes ship without an advisory, ever. Here is what that means for the dependency graph you have today, and the few signals that catch them.</description>
      <category>silent-patches</category>
      <category>disclosure</category>
      <category>advisory-databases</category>
    </item>
    <item>
      <title>Snyk vs dependency intelligence: what each one catches</title>
      <link>https://depoversight.com/blog/snyk-vs-dependency-intelligence/</link>
      <guid isPermaLink="true">https://depoversight.com/blog/snyk-vs-dependency-intelligence/</guid>
      <pubDate>Mon, 04 May 2026 00:00:00 GMT</pubDate>
      <description>Snyk and dependency intelligence answer different questions. A factual look at what Snyk is built to do, what dependency intelligence adds, and how teams running both place them in the stack.</description>
      <category>comparison</category>
      <category>snyk</category>
      <category>vulnerability-scanning</category>
    </item>
    <item>
      <title>Reading commit messages for security-relevant signals</title>
      <link>https://depoversight.com/blog/reading-commits-for-security-signals/</link>
      <guid isPermaLink="true">https://depoversight.com/blog/reading-commits-for-security-signals/</guid>
      <pubDate>Sun, 03 May 2026 00:00:00 GMT</pubDate>
      <description>A practical taxonomy of the language patterns, diff shapes, and test names that reveal a security-relevant fix in commits, long before any advisory exists.</description>
      <category>commit-analysis</category>
      <category>detection</category>
      <category>fundamentals</category>
    </item>
    <item>
      <title>The hidden window between a security fix and a public CVE</title>
      <link>https://depoversight.com/blog/hidden-window-between-fix-and-cve/</link>
      <guid isPermaLink="true">https://depoversight.com/blog/hidden-window-between-fix-and-cve/</guid>
      <pubDate>Sat, 02 May 2026 00:00:00 GMT</pubDate>
      <description>For most vulnerabilities, the fix lands in main long before any advisory or CVE exists. The gap is measured in days for the lucky cases and months for the median. Here is what happens in that window.</description>
      <category>pre-cve</category>
      <category>disclosure</category>
      <category>advisory-databases</category>
    </item>
    <item>
      <title>How DepOversight would have caught the axios npm compromise</title>
      <link>https://depoversight.com/blog/axios-supply-chain/</link>
      <guid isPermaLink="true">https://depoversight.com/blog/axios-supply-chain/</guid>
      <pubDate>Fri, 01 May 2026 00:00:00 GMT</pubDate>
      <description>On 31 March 2026, two malicious axios releases were live on npm for just over three hours. There was no CVE. There was no advisory. Here is what we would have surfaced, and when.</description>
      <category>supply-chain</category>
      <category>npm</category>
      <category>axios</category>
      <category>worked-example</category>
    </item>
  </channel>
</rss>
