Introducing Dependency Radar
A new real-time supply chain security feed from open source downloads tracked by Scarf
Supply chain security is a messy but dire topic right now, as even security companies seem to be getting breached every week. AI is creating cybersecurity threats that are moving faster than ever.
I found myself wondering what insights Scarf’s data — billions of OSS downloads every day — might offer to make a meaningful contribution to supply chain security efforts. A brief exploration showed the direction to be promising and worth serious investigation within the Scarf community.
Most large enterprises are still downloading known-vulnerable OSS packages. I don’t just mean brand-new issues like the recent Axios vulnerability. There were millions of downloads of old Log4Shell-impacted versions of Log4j in the last month, even though that vulnerability was patched years ago.
To be clear, a download does not necessarily mean a vulnerable package is running in production. But it does mean vulnerable versions are still moving through enterprise environments: developer laptops, CI systems, build pipelines, internal tools, and legacy systems.
This may not be surprising when you consider a few factors:
- Most supply chain security tools focus on scanning static code, SBOMs, or restricting access. Those are important, but they do not necessarily monitor real-time behavior. They might catch what you’re about to deploy or merge, but they won’t always catch what one of your engineers, build systems, or AI agents might be downloading right now on their machine.
- Legacy systems can be very hard to update.
- AI is making the whole problem move faster. More code is being written, modified, and deployed automatically, and the time between vulnerability discovery and attempted exploitation is getting shorter.
Introducing: Dependency Radar
To help companies stay ahead, we’re launching a new API-based feed in Scarf called Dependency Radar.
Think of it as a single firehose of every OSS download Scarf sees from your company, across the billions of downloads we track daily.
Monitor what your team is downloading, feed it to your AI agents or ours, and get real-time insights about live risks in your supply chain.
Static scanning only tells you part of the story. Dependency Radar helps show what your organization is actually downloading.
How much does Dependency Radar cost?
Dependency Radar is available to everyone, including users on the free tier.
Each API call to Dependency Radar consumes 1 Run. See https://www.scarf.sh/pricing for more information on Run credits.
Each API call can return up to 1,000 raw download events at a time.
Do I have access to download data for my entire company? Who gets access to this?
Access is restricted to verified organizations.
You’ll need:
- A verified company email address that matches the domain of the events you are trying to query.
- Your Scarf organization must also have a billing email address tied to the same domain.
Example: If your organization has an @example.com billing email, your account must have a verified @example.com email address to access this API.
Your Dependency Radar feed will include download events that Scarf maps to your company domain.
How do I get started?
The best way is to ask your Scarf AI Agent in Slack, or ask your LLM using our AI skill:
https://github.com/scarf-sh/scarf-skill
Dependency Radar is also accessible directly through Scarf’s public API.
What’s next
We want to get this feed out to enterprise security teams as quickly as possible.
We’re looking for feedback on what they find, how they use it, and what they want to see next.
If you work on software supply chain security and want real-time visibility into what your organization is actually downloading from open source, we’d love for you to try Dependency Radar.
Introducing Scarf's New Pricing Model
Today we are launching a new pricing model for new Scarf accounts going forward, and we'd love your feedback. For customers already on a paid Scarf plan, your billing will not be impacted by this change.
Scarf Go SDK is Now Available
Scarf's Go SDK is now available on GitHub. You can now send telemetry to Scarf from your Golang code more easily than ever, with things like user opt-out being managed for you.
Scarf's GitBook Integration Is Live!
A common request we've received from the Scarf community is that many of you are using GitBook for your docs, which does not directly support a way to embed your Scarf tracking pixel.