Product Update - 9/24/2025

We’ve focused on reducing risk from supply chain attacks, improving detection of risky configurations in Spring Boot apps, and going deep on dependency lineage. Here's what’s new in Heeler:

Added Protections for Supply Chain Attacks

Block dependencies before the ecosystem can vet them.

Heeler now includes a Minimum Age guardrail that blocks newly released dependency versions that haven’t had time to be analyzed by the security community.

Most supply chain attacks target freshly published packages, which are discovered within 24 hours of release.

Recommendation: Set a minimum age of 2 days to give time for threat intel and community detection to catch malicious packages.

Detect Unpinned Dependencies

Pinning dependencies is one of the most effective defenses against supply chain attacks. Heeler now makes it easy to filter for repositories with unpinned dependencies—so you can enforce better hygiene and proactively reduce your attack surface.

Spring Boot Actuator Exposure Detection

Actuator endpoints now visible—along with their security posture. Spring Boot Actuator endpoints can unintentionally expose:

  • Environment variables

  • Secrets (like API keys and passwords)

  • Remote code execution vectors

Heeler now detects:

  • Which Actuator endpoints are enabled

  • Whether the endpoints are authenticated or publicly exposed

Use the repository filter to detect where actuator endpoints are enabled:

You can also view the authentication status for each endpoint, with results included in Heeler’s API export for broader automation and alerting.

SBOM + Deep Dependency Graph: First-Party, Transitive & Bundled Dependencies

Heeler now provides even deeper visibility into your application’s software supply chain with improved dependency classification and SBOM generation.

Visualize the Full Dependency Graph

Heeler’s enhanced dependency graph now clearly distinguishes between:

  • Root nodes (entry point for each codebase)

  • Direct dependencies

  • Transitive dependencies

  • First-party libraries

  • Bundled dependencies (especially common in JavaScript)

This makes it easier to trace how every dependency enters your codebase—and who’s responsible for it.

Quickly identify key context for dependencies such as classification and license:

Dependency graph for a transitive Java dependency brought in through a first party library:

SBOM Generation at the Code Root

You can now generate a Software Bill of Materials (SBOM) from the Code Root level in CycloneDX format. Heeler’s SBOM includes:

  • Dependency relationships (direct, transitive, bundled)

  • First-party vs third-party classification

  • License information

This helps teams meet compliance requirements and improve visibility across the software lifecycle.

License Policy Enforcement

Manage license risk with confidence—especially in the age of AI-assisted development. As AI-generated code becomes more common, managing open source licenses has grown both more complex and more critical. Heeler now helps teams reduce license risk with:

  • A global license policy to define what’s allowed

  • Real-time detection of license violations in dependencies

  • A guardrail to automatically block risky license usage in pull requests

Customizable Global License Policy

A default license policy based on OSI-approved licenses is now available. Admins can customize this policy to align with your organization’s legal or compliance requirements. This policy powers Heeler’s detection and enforcement capabilities, including the Unapproved License guardrail.

License Violations in Dependency Listings

Heeler now flags any dependency—direct or transitive—that violates the license policy. This gives developers and security teams immediate visibility into license risk across the codebase.

Guardrail: Unapproved License Blocking

Use the Unapproved License guardrail to automatically prevent risky licenses from being introduced. This guardrail can block pull requests that attempt to add any dependency (direct or transitive) that violates your policy—stopping issues before they reach production.

Language Expansion: Ruby, PHP, Rust & Kotlin

Heeler now supports Ruby, PHP, Rust, and Kotlin, continuing our push to deliver deeper, broader language coverage.

Deep Analysis with Build Emulation

All newly supported languages use Heeler’s build emulation technology to analyze dependencies—even when lockfiles are missing. This allows Heeler to uncover both direct and transitive dependencies and display them in a clear dependency graph.

Ruby and PHP go a step further by providing additional metadata, including:

  • Language version

  • Dependency scope

These details improve prioritization and fixability insights.

We’ve also added API endpoint enumeration for the most widely-used frameworks in each language—helping you discover attack surface and perform faster security reviews.

Agentic Remediation – Coming Soon!

Automated pull requests for safe, validated dependency upgrades. Heeler’s upcoming agentic remediation capability will automatically generate non-breaking, validated pull requests for eligible dependency upgrades.

As a preview, you’ll start seeing a new “Automatable” flag alongside fixability analysis—indicating which remediations Heeler can handle for you.

Agentic remediation helps eliminate years of accumulated dependency debt—saving security and engineering teams significant time while improving application resilience.

Last updated

Was this helpful?