aikido intel logoPowered by AI + Aikido Research Team

Aikido Threat Intelligence

Your earliest warning for supply chain threats. We expose malware and vulnerabilities in open-source ecosystems, within minutes.

Most Recent

High
21 hours ago

@sveltejs/adapter-vercel is vulnerable to Acceptance of Extraneous Untrusted Data With Trusted Data

Upgrade the @sveltejs/adapter-vercel library to a patch version.

CVE-2026-27118AIKIDO-2026-10191
Critical
Feb 16, 2026

vm2 is vulnerable to Improper Control of Generation of Code ('Code Injection')

Upgrade the vm2 library to the patch version.

CVE-2026-22709AIKIDO-2026-10190
High
Feb 16, 2026

keras-hub is vulnerable to Improper Input Validation

Upgrade the keras-hub library to the patch version.

Pre-CVE
Found by Aikido Intel before public disclosure or CVE publication.
AIKIDO-2026-10189
Low
Feb 16, 2026

html-dom-parser is vulnerable to Regular Expression Denial of Service (ReDoS)

Upgrade the html-dom-parser library to the patch version.

Pre-CVE
Found by Aikido Intel before public disclosure or CVE publication.
AIKIDO-2026-10188
Low
Feb 16, 2026

github.com/cyberark/secretless-broker is vulnerable to Uncontrolled Resource Consumption

Upgrade the github.com/cyberark/secretless-broker library to the patch version.

Pre-CVE
Found by Aikido Intel before public disclosure or CVE publication.
AIKIDO-2026-10187
Medium
Feb 16, 2026

onnxruntime is vulnerable to Path Traversal

Upgrade the com.microsoft.onnxruntime:onnxruntime library to the patch version.

Pre-CVE
Found by Aikido Intel before public disclosure or CVE publication.
AIKIDO-2026-10185
Medium
Feb 16, 2026

onnxruntime is vulnerable to Null Pointer Dereference

Upgrade the com.microsoft.onnxruntime:onnxruntime library to the patch version.

Pre-CVE
Found by Aikido Intel before public disclosure or CVE publication.
AIKIDO-2026-10184
Medium
Feb 16, 2026

Microsoft.ML.OnnxRuntime is vulnerable to Null Pointer Dereference

Upgrade the Microsoft.ML.OnnxRuntime library to the patch version.

Pre-CVE
Found by Aikido Intel before public disclosure or CVE publication.
AIKIDO-2026-10183
Medium
Feb 16, 2026

Microsoft.ML.OnnxRuntime is vulnerable to Path Traversal

Upgrade the Microsoft.ML.OnnxRuntime library to the patch version.

Pre-CVE
Found by Aikido Intel before public disclosure or CVE publication.
AIKIDO-2026-10182
Medium
Feb 16, 2026

onnxruntime is vulnerable to Path Traversal

Upgrade the onnxruntime library to the patch version.

Pre-CVE
Found by Aikido Intel before public disclosure or CVE publication.
AIKIDO-2026-10181

Protect yourself from malware upon install with Aikido Safe Chain (open source)

Install Safe Chain

High Profile Pre-CVE
Found by Aikido Intel before public disclosure or CVE publication.

High
Feb 16, 2026

keras-hub is vulnerable to Improper Input Validation

Upgrade the keras-hub library to the patch version.

Pre-CVE
Found by Aikido Intel before public disclosure or CVE publication.
AIKIDO-2026-10189
High
Feb 16, 2026

github.com/hashicorp/copywrite is vulnerable to Improper Neutralization of Special Elements Used in a Template Engine

Upgrade the github.com/hashicorp/copywrite library to the patch version.

Pre-CVE
Found by Aikido Intel before public disclosure or CVE publication.
AIKIDO-2026-10177
High
Feb 12, 2026

strapi-plugin-comments is vulnerable to Cross-site Scripting (XSS)

Upgrade the strapi-plugin-comments library to the patch version.

Pre-CVE
Found by Aikido Intel before public disclosure or CVE publication.
AIKIDO-2026-10171

Search and Compare Health
of Open-Source Packages.

Make confident, secure choices for your next build.

Go to Package Health
Packagist
NPM
PyPi

Our Intel, Your Security

Open source

Open Source

Aikido Intel is available under AGPL license, developers may freely use, modify, and distribute the vulnerability & malware feed.

Contribute to Intel
License the intel database

License the Intel Database

Want to integrate our threat intelligence into your product? Get access through our commercial API.

Get Access

Get Secure Now

Secure your code, cloud, and runtime environments in one central system. Find and fix vulnerabilities automatically.

Get Secure