Why do I need protection from open source malware?
Public open source repositories can be compromised, and developers are frequently targeted by malicious open source packages. Proactive protection stops open source malware from sneaking into your builds and reaching production systems.
What’s the difference between malware and vulnerabilities?
Vulnerabilities are accidental flaws in trusted software — like unpatched bugs. Malware is intentional — code crafted by attackers to cause harm. Most Software Composition Analysis (SCA) tools only detect known vulnerabilities and miss malicious behavior entirely. Repository Firewall is purpose-built to detect and block open source malware from the start — solving a different problem that traditional SCA tools can't address.
Does my perimeter or endpoint solution protect me from open source malware?
No. Perimeter and endpoint solutions aren't built to detect open source malware and lack specialized malware intelligence. Repository Firewall uses Sonatype's unique malware intelligence to proactively identify and block malicious open source components before it enters your development environment.
Does Sonatype Repository Firewall require a repository manager?
While Repository Firewall integrates directly into repository managers like Sonatype Nexus Repository and JFrog Artifactory, a repository manager is not required. Repository Firewall can protect your software supply chain even without a dedicated repository manager. It integrates directly with security tools such as Zscaler for network-level protection and uses flexible APIs for seamless integration into custom workflows or existing CI/CD pipelines.
Is Sonatype Repository Firewall compatible with existing network security tools?
Yes, Repository Firewall connects seamlessly with network security solutions such as Zscaler, extending malware protection to the network edge for comprehensive coverage.
Can Sonatype Repository Firewall detect malware in AI/ML models?
Yes. Repository Firewall includes support from Hugging Face. Just like open source packages, these models are evaluated at the point of download to determine if they violate security policies or exhibit suspicious or malicious behavior. That means your data science and engineering teams can innovate with the latest models — confident that every download is secure and policy-compliant.
How quickly does Sonatype Repository Firewall identify and block threats?
Threat detection and blocking happen automatically, in real time. As soon as a developer or system tries to download a malicious or policy-violating component — whether it’s a package, container, or AI model — Repository Firewall steps in to block it before it ever enters your development environment. Its advanced malware intelligence minimizes false positives so only true threats are blocked. In rare cases of uncertainty, components are quarantined for further analysis, and automatically released if deemed safe – ensuring developers aren’t stuck waiting on security.
Can Sonatype Repository Firewall help with policy enforcement and waivers?
Yes, Repository Firewall automates open source governance by quarantining non-compliant components. The powerful policy engine supports flexible policy waivers, including time-based and scoped exceptions, to balance security with development speed.
How often does Sonatype Repository Firewall update its malware database?
Repository Firewall continuously updates its malware database, providing real-time protection against the latest open source threats.