Know if an open source package is safe — before you install it.
22 scanners. 8 AI analysts. One command. Runs locally in a hardened VM.
Open source · View on GitHub
Supply chain attacks grew 180% since 2022. Open source packages get hijacked, abandoned, or backdoored every week. The average time from compromise to exploitation: minutes, not months.
Most security tools scan your code and for known CVEs and call it done. Who’s scanning the code your code for the things that are not known?
Modern software is assembled from thousands of open source packages — code written by strangers all over the world. Any one of those packages can be hijacked, abandoned, or built with hidden backdoors. When that happens, attackers don’t break in through the front door — they come in through the building materials.
Thresher is a free, open source tool that scans those building materials — every dependency, every layer — and tells you what’s safe and what’s not. One command, full picture.
Snyk, Semgrep, and Socket are great tools. They scan for known CVEs in your dependency tree. But known CVEs are the easy part.
What about the IDOR that lets any user delete another user’s data? The path traversal hiding behind a startsWith() check? The hardcoded API key in a utility script? The SQL injection that bypasses the keyword blocklist via ATTACH DATABASE? These are real findings from a real Thresher scan — see the full report.
brew install thresher and point it at a repo. You get a full security assessment in minutes.