Seal Security provides standalone security patches that are fully compatible with existing versions of open source packages, ensuring seamless and predictable fixes for vulnerabilities in both application code and Linux operating systems.
Other AppSec tools usually focus on visibility, providing you with a list of your open source vulnerabilities, or on prioritization, trying to creatively arrange that list. At Seal Security we focus on remediation, actually fixing the underlying vulnerabilities for you, clearing the list instead of just shuffling it around.
The typical proof-of-value includes the customer selecting a test project, us providing the remediated versions for several vulnerable packages, and the customer testing it to see that everything works as expected. The entire process shouldn’t take more than 2-3 weeks.
We handle all critical and high rated vulnerabilities within 72 hours of being made public. Lower rated vulnerabilities are handled in accordance with the contractually agreed SLA.
Yes, with the Seal platform you can detect vulnerable packages in your source code, or as part of your CI pipeline.
Seal Security is certified with SOC-2 type II and ISO-27001. See more in our compliance page.
Seal Security’s patches do not affect your organization’s licensing requirements. Our patches are released with a permissive license, however you still must abide by the requirements of the original package’s license.
We don’t have a hard limit for how far back we support. As long as the source code is publicly available, we can fix it.
Seal Security offers 24/7 support, including direct Slack/Teams channels with our customers.
The best method is to contact us via the joint Slack/Teams channel we have with your organization. You can also email support@sealsecurity.io. For urgent cases you can email emergency@sealsecurity.io which will immediately trigger our on-call support.
We currently have support for Java, Python, Javascript, C/C++, PHP, C#, Ruby.
There are 2 main ways (which you can read about more in our documentation):
The Seal platform supports a variety of integrations with existing security scanners. These scanners will then know that a specific vulnerability in a specific package was remediated by Seal Security, and present it accordingly.
Yes, while our solution works best as a SaaS solution, it’s possible to use our remediated versions in an on-prem setup.
Seal OS supports all of the above - containers, virtual machines as well as bare metals.
None! We’re entirely a build-time solution, so no permissions are necessary.
As a rule, we use the community fixes with the minimal necessary changes. Our fixes are tiny, usually fewer than 10 lines-of-code, compared with the hundreds or thousands of lines that change in a typical version upgrade, thereby dramatically reducing the risk of unforeseen side effects.
All our remediated versions undergo thorough testing and quality assurance processes, including manual inspection by our vulnerability research team, and by a dedicated AI tool that verifies there are no breaking changes.
And, since our platform runs at build-time, all of your existing tests run on our remediated version, providing an extra layer of assurance.
If the choice were simply between always staying on the latest version or never upgrading, we wouldn’t be having this conversation. The real question is whether you patch vulnerabilities or live with the risk. Staying on the latest version sounds ideal, but in practice, it’s often not feasible due to compatibility issues, breaking changes, and operational constraints. That’s why Seal Security helps you remediate vulnerabilities without disrupting your software.
For a deeper dive into why “new” isn’t always better, check out our blog post - https://www.seal.security/blog/keeping-your-open-source-dependencies-vulnerability-free-beyond-version-chasing