• bitcoinBitcoin(BTC)$75,833.000.20%
  • ethereumEthereum(ETH)$2,075.230.64%
  • tetherTether(USDT)$1.000.00%
  • binancecoinBNB(BNB)$651.480.19%
  • rippleXRP(XRP)$1.340.61%
  • usd-coinUSDC(USDC)$1.000.00%
  • solanaSolana(SOL)$84.780.66%
  • tronTRON(TRX)$0.360888-0.30%
  • Figure HelocFigure Heloc(FIGR_HELOC)$1.03-0.06%
  • dogecoinDogecoin(DOGE)$0.102331-0.52%
  • HyperliquidHyperliquid(HYPE)$58.283.83%
  • USDSUSDS(USDS)$1.000.00%
  • zcashZcash(ZEC)$614.000.75%
  • leo-tokenLEO Token(LEO)$9.930.16%
  • cardanoCardano(ADA)$0.2439330.40%
  • bitcoin-cashBitcoin Cash(BCH)$352.07-5.24%
  • moneroMonero(XMR)$379.83-0.13%
  • chainlinkChainlink(LINK)$9.38-0.18%
  • whitebitWhiteBIT Coin(WBT)$55.910.30%
  • CantonCanton(CC)$0.1596043.84%
  • stellarStellar(XLM)$0.1457431.16%
  • the-open-networkToncoin(TON)$1.81-4.28%
  • USD1USD1(USD1)$1.00-0.02%
  • Ethena USDeEthena USDe(USDE)$1.000.01%
  • daiDai(DAI)$1.000.00%
  • suiSui(SUI)$1.05-0.32%
  • litecoinLitecoin(LTC)$53.230.60%
  • avalanche-2Avalanche(AVAX)$9.271.04%
  • hedera-hashgraphHedera(HBAR)$0.0883150.53%
  • MemeCoreMemeCore(M)$2.895.08%
  • paypal-usdPayPal USD(PYUSD)$1.000.02%
  • RainRain(RAIN)$0.0074982.45%
  • shiba-inuShiba Inu(SHIB)$0.000006-1.34%
  • nearNEAR Protocol(NEAR)$2.4012.49%
  • crypto-com-chainCronos(CRO)$0.0688731.28%
  • Circle USYCCircle USYC(USYC)$1.13-0.01%
  • Global DollarGlobal Dollar(USDG)$1.000.01%
  • tether-goldTether Gold(XAUT)$4,502.900.08%
  • BittensorBittensor(TAO)$273.761.22%
  • BlackRock USD Institutional Digital Liquidity FundBlackRock USD Institutional Digital Liquidity Fund(BUIDL)$1.000.00%
  • uniswapUniswap(UNI)$3.43-0.92%
  • mantleMantle(MNT)$0.663.00%
  • polkadotPolkadot(DOT)$1.270.30%
  • Ondo US Dollar YieldOndo US Dollar Yield(USDY)$1.13-0.57%
  • pax-goldPAX Gold(PAXG)$4,510.760.22%
  • OndoOndo(ONDO)$0.4253068.53%
  • World Liberty FinancialWorld Liberty Financial(WLFI)$0.0624755.75%
  • HTX DAOHTX DAO(HTX)$0.0000020.13%
  • Falcon USDFalcon USD(USDF)$1.00-0.02%
  • Ripple USDRipple USD(RLUSD)$1.000.02%
TradePoint.io
  • Main
  • AI & Technology
  • Stock Charts
  • Market & News
  • Business
  • Finance Tips
  • Trade Tube
  • Blog
  • Shop
No Result
View All Result
TradePoint.io
No Result
View All Result

Perplexity Open-Sources Bumblebee: A Read-Only Supply-Chain Scanner for Developer Endpoints

May 23, 2026
in AI & Technology
Reading Time: 6 mins read
A A
Perplexity Open-Sources Bumblebee: A Read-Only Supply-Chain Scanner for Developer Endpoints
ShareShareShareShareShare

Attackers increasingly target the packages, editor extensions, and AI tool configs on developer machines and not just production systems. Perplexity has open-sourced an internal tool it uses to address this problem.

Perplexity released Bumblebee on GitHub. The tool is a read-only inventory collector for macOS and Linux developer endpoints. It is written entirely in Go and carries zero non-stdlib dependencies. Perplexity already uses it internally to protect developer systems behind its search product, Comet browser, and Computer agent.

YOU MAY ALSO LIKE

Italian Authorities Shut Down Major Streaming Piracy Network

DeepSeek Permanently Reduces The Price Of Its Flagship V4 Model By 75 Percent

Problem that Bumblebee Solves

If you are a software engineer or data scientist, you likely have dozens of packages installed locally. You have editor extensions, browser add-ons, and possibly MCP (Model Context Protocol) configs on your machine. When a new vulnerability surfaces, your security team faces one urgent question: which developer machines are exposed right now?

Existing tools do not fully answer this. SBOMs (Software Bills of Materials) and vulnerability scanners cover build artifacts and repositories. EDR (Endpoint Detection and Response) products track what processes ran or touched the network. Neither checks local developer state — lockfiles, package metadata, extension manifests, and AI tool configs scattered across a laptop’s filesystem.

Bumblebee fills that gap. When an advisory names a package, extension, or version, it answers which machines show a match in their on-disk metadata right now. The ecosystem scope was also deliberate: the covered ecosystems map to recent active supply-chain campaigns, including the Mini Shai-Hulud series, which hit npm, PyPI, RubyGems, Go modules, and Composer packages across companies including TanStack, SAP, and Zapier.

How Bumblebee Works

Bumblebee is a one-shot scanner. Each invocation performs a single scan and exits. Cadence is the operator’s responsibility — cron, launchd, systemd, or MDM fleet tooling. It outputs structured records as NDJSON (newline-delimited JSON), one per line, with diagnostics going to stderr.

The tool supports three scan profiles. The baseline profile scans common global and user package roots, language toolchains, editor extensions, browser extensions, and MCP configs. The project profile targets configured development directories such as ~/code or ~/src. The deep profile sweeps operator-supplied roots, typically a bare home directory during an active incident.

Internally, Perplexity uses Bumblebee inside a five-step workflow. A threat signal arrives from public disclosures or third-party intel feeds. Perplexity Computer then drafts a catalog update, entering the signal as a structured entry with ecosystem, package name, and version — and opens a GitHub PR with source links. A human dev reviews and merges the PR. Bumblebee then runs on endpoints with the updated catalog, and findings are shared with the security team.

Image source: https://www.perplexity.ai/hub/blog/perplexity-is-open-sourcing-bumblebee

What Bumblebee Scans

Bumblebee covers four surface areas that existing tools typically handle separately.

For language package managers, it reads from npm, pnpm, Yarn, Bun, PyPI, Go modules, RubyGems, and Composer. It reads lockfiles and installed package metadata directly — sources like package-lock.json, pnpm-lock.yaml, go.sum, and *.dist-info/METADATA. Note that bun.lockb, Bun’s binary lockfile format, is not parsed in v0.1; only the text bun.lock format is supported.

For AI agent configs, Bumblebee reads MCP JSON host configuration files: mcp.json, .mcp.json, claude_desktop_config.json, mcp_config.json, mcp_settings.json, cline_mcp_settings.json, and ~/.gemini/settings.json for Gemini CLI. Non-JSON MCP configs such as Codex config.toml and Continue YAML are not parsed in v0.1. It parses these files for server inventory but does not emit environment values or environment key names found in env blocks.

For editor extensions, it reads manifests from VS Code, Cursor, Windsurf, and VSCodium. For browser extensions, it covers Chromium-family browsers — Chrome, Comet, Edge, Brave, and Arc — plus Firefox.

Why Read-Only

npm packages can carry postinstall scripts that execute automatically on npm install. A scanner that invokes npm to check exposure has already triggered the attack it was looking for. Bumblebee avoids this entirely by never running install scripts or lifecycle hooks, never invoking npm, pnpm, bun, or pip, never reading application source files, and performing no process or network monitoring. It is not an EDR.

Output and Exposure Catalog

Each package record includes the hostname, OS, architecture, ecosystem, package name, version, source file, and a confidence field. Confidence is high when exact identity and version came from canonical metadata, medium when identity is reliable but version or source is partial, and low when only a config path or spec reference is found.

Security teams supply their own exposure catalogs — simple JSON files specifying ecosystem, package name, and affected versions. When Bumblebee finds a match, it emits a finding record including severity, catalog ID, and evidence. Each finding is fully traceable back to which catalog entry triggered it. The repo also includes a threat_intel/ directory with maintained exposure catalogs built from public supply-chain campaign reporting.

Getting Started

Bumblebee requires Go 1.25 or later. Install with:

go install github.com/perplexityai/bumblebee/cmd/bumblebee@latest

After install, bumblebee selftest verifies the binary works correctly against embedded fixtures. The tool is licensed under Apache License 2.0. The current release is v0.1.1.

Key Takeaways

  • Bumblebee is Perplexity’s open-sourced, read-only developer endpoint scanner for supply-chain exposure checks.
  • It covers npm, pnpm, Yarn, Bun, PyPI, Go modules, RubyGems, Composer, MCP configs, editor extensions, and browser extensions.
  • Three scan profiles — baseline, project, and deep — support routine inventory and active incident response.
  • The tool never executes install scripts or invokes package managers, preventing scan-triggered attacks.
  • Built in Go with zero non-stdlib dependencies; available now on GitHub under Apache 2.0.

Check out the GitHub Repo and Technical details. Also, feel free to follow us on Twitter and don’t forget to join our 150k+ ML SubReddit and Subscribe to our Newsletter. Wait! are you on telegram? now you can join us on telegram as well.

Need to partner with us for promoting your GitHub Repo OR Hugging Face Page OR Product Release OR Webinar etc.? Connect with us


Credit: Source link

ShareTweetSendSharePin

Related Posts

Italian Authorities Shut Down Major Streaming Piracy Network
AI & Technology

Italian Authorities Shut Down Major Streaming Piracy Network

May 23, 2026
DeepSeek Permanently Reduces The Price Of Its Flagship V4 Model By 75 Percent
AI & Technology

DeepSeek Permanently Reduces The Price Of Its Flagship V4 Model By 75 Percent

May 23, 2026
Anthropic Says Mythos Has Already Found More Than 10,000 Vulnerabilities
AI & Technology

Anthropic Says Mythos Has Already Found More Than 10,000 Vulnerabilities

May 23, 2026
Myst And Riven Remakes, The Return Of Bubsy And Other New Indie Games Worth Checking Out
AI & Technology

Myst And Riven Remakes, The Return Of Bubsy And Other New Indie Games Worth Checking Out

May 23, 2026
Next Post
Why Amphenol Is The Ultimate Pick-And-Shovel Play For The AI And Robotics Boom

Why Amphenol Is The Ultimate Pick-And-Shovel Play For The AI And Robotics Boom

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Search

No Result
View All Result
I’m 0k in Debt, Should I Be Investing?

I’m $600k in Debt, Should I Be Investing?

May 20, 2026
Take an inside look at war-torn Lebanon

Take an inside look at war-torn Lebanon

May 19, 2026
Growing calls to stop the opening of Sloth World after dozens of the animals died

Growing calls to stop the opening of Sloth World after dozens of the animals died

May 17, 2026

About

Learn more

Our Services

Legal

Privacy Policy

Terms of Use

Bloggers

Learn more

Article Links

Contact

Advertise

Ask us anything

©2020- TradePoint.io - All rights reserved!

Tradepoint.io, being just a publishing and technology platform, is not a registered broker-dealer or investment adviser. So we do not provide investment advice. Rather, brokerage services are provided to clients of Tradepoint.io by independent SEC-registered broker-dealers and members of FINRA/SIPC. Every form of investing carries some risk and past performance is not a guarantee of future results. “Tradepoint.io“, “Instant Investing” and “My Trading Tools” are registered trademarks of Apperbuild, LLC.

This website is operated by Apperbuild, LLC. We have no link to any brokerage firm and we do not provide investment advice. Every information and resource we provide is solely for the education of our readers. © 2020 Apperbuild, LLC. All rights reserved.

No Result
View All Result
  • Main
  • AI & Technology
  • Stock Charts
  • Market & News
  • Business
  • Finance Tips
  • Trade Tube
  • Blog
  • Shop

© 2023 - TradePoint.io - All Rights Reserved!