Dependency Security Blog | GeekWala
Loading...
Skip to main content

Security Insights & Guides

Cut through vulnerability noise. Practical guides for dev teams who ship.

NuGet Vulnerability Scanning: What dotnet audit Misses
Ecosystem Guide

NuGet Vulnerability Scanning: What dotnet audit Misses

.NET's NuGet ecosystem powers millions of enterprise applications, but built-in tools like dotnet list package --vulnerable only show you advisory matches — not which vulnerabilities are being actively exploited. Learn how to scan your .csproj and packages.config files and prioritize real threats.

4 min read
Go Vulnerability Scanning: What govulncheck Misses
Ecosystem Guide

Go Vulnerability Scanning: What govulncheck Misses

Go's module system and govulncheck provide a strong security baseline, but they miss exploitation signals that matter in production. Learn how to scan your go.mod dependencies, compare govulncheck with multi-signal tools, and build a Go dependency security workflow.

13 min read
Java Dependency Security: Scanning Maven Vulnerabilities
Ecosystem Guide

Java Dependency Security: Scanning Maven Vulnerabilities

Java's dependency ecosystem spans Maven Central, Gradle, and enterprise repositories — with transitive dependency trees that routinely exceed 200 packages. Learn how to scan your pom.xml and build.gradle files for vulnerabilities and prioritize the ones attackers are actually exploiting.

14 min read
Rust Vulnerability Scanning: What cargo audit Misses
Ecosystem Guide

Rust Vulnerability Scanning: What cargo audit Misses

Rust's safety guarantees end at your dependency boundary. In 2026, the Rust security ecosystem has matured significantly — but gaps remain. Learn how to scan your Cargo.toml dependencies, compare cargo audit with multi-signal tools, and adopt best practices for Rust supply chain security.

10 min read
Python Dependency Security: Scanning PyPI Vulnerabilities
Ecosystem Guide

Python Dependency Security: Scanning PyPI Vulnerabilities

Python's dependency ecosystem makes security uniquely challenging — fragmented advisory databases, multiple manifest formats, and transitive dependency chains. Learn how to check your PyPI packages for vulnerabilities and build a practical security workflow.

11 min read
CISA KEV Explained: Actively Exploited Vulnerabilities
Security

CISA KEV Explained: Actively Exploited Vulnerabilities

CISA maintains the Known Exploited Vulnerabilities catalog — a curated list of CVEs actively being used in attacks right now. If a vulnerability is on KEV, it is not theoretical. Learn what KEV is, how entries are added, and how to use it in your triage workflow.

10 min read
What is EPSS? Prioritize Vulnerabilities by Exploit Risk
Security

What is EPSS? Prioritize Vulnerabilities by Exploit Risk

The Exploit Prediction Scoring System (EPSS) estimates the probability a CVE will be exploited in the wild within 30 days. Learn how to read EPSS scores, combine them with CVSS, and build a triage workflow that actually reduces risk.

9 min read
npm audit vs GeekWala: Why CVSS Scores Alone Are Misleading
Ecosystem Guide

npm audit vs GeekWala: Why CVSS Scores Alone Are Misleading

npm audit flags every CVE by CVSS severity, but CVSS alone is a poor predictor of real exploitation. Learn how EPSS and CISA KEV signals cut through alert fatigue and prioritize the vulnerabilities that actually matter.

7 min read