Company
Date Published
Author
Hadas Bloom
Word count
734
Language
English
Hacker News points
None

Summary

Snyk's security intelligence is built by a dedicated team of analysts, researchers, and engineers who use advanced technologies to maintain the integrity and accuracy of its vulnerability database. The Snyk Vulnerability Database derives its strength from multiple sources, including structured databases, official advisories, unearthing unpublished vulnerabilities using machine learning algorithms, community and academic disclosures, proprietary research, and human intelligence augmented by AI. While NVD may experience delays in their analysis process, Snyk's open source advisories are not dependent on NVD and undergo rigorous assessment by Snyk security analysts. The delivery of vulnerability data is also unaffected by external incidents like NVD delays. Additionally, Snyk's container advisories rely on a semi-automated process that considers multiple sources for assessment, taking into account the Linux distribution's information and NVD's assessments when available. Snyk's vulnerability data often comes out ahead of NVD and includes high or critical severity vulnerabilities that have not yet been analyzed by NVD.