Launching June 2026

Know when your dependencies are vulnerable

Upload your lock file. We scan it against the OSV database and notify you the moment a new CVE hits your dependencies — via Slack, Discord, Telegram, email, or webhook. Any ecosystem. No agent required.

No credit card required. No spam. Unsubscribe anytime.

Supports all major ecosystems

Rust npm Python Go Maven Gradle RubyGems and 30+ more

Your AI coding assistant doesn't know
your dependencies are vulnerable.

Copilot, Cursor, Claude, and every other AI coding tool have a training cutoff. They don't know about CVEs published last week — or last month. When an AI agent adds a dependency, it has no idea whether that package is vulnerable right now. And it compounds: the developers of your dependencies ship with AI too. CI/CD checks helps, but don't eliminate the risk — they only run at build time. Know proactively what you're delivering, not just what you last committed.

Without oppsy
  • AI agent adds express@4.18.2
  • CI passes — no known CVEs at build time
  • CVE published days later
  • You're still shipping it — and nobody told you
With oppsy
  • AI agent adds express@4.18.2
  • CI passes — no known CVEs at build time
  • CVE published days later
  • You get a Slack alert within hours — act fast and minimize the impact on your users

Everything you need. Nothing you don't.

Notifications where you work

Slack, Discord, Telegram, email, and signed webhooks. Route alerts to the right channel per workspace — no context switching, no dashboards to check.

30+ ecosystems via OSV

Rust, Python, Node.js, Go, Java, Ruby, and more — all covered by the OSV database maintained by Google.

Your code stays yours

You only upload a lock file — never your source code. We scan dependencies, not your application.

Severity filtering

Only get paged for CRITICAL and HIGH — or configure everything. Zero noise, only signal.

Any platform, any host

Works with any codebase regardless of where it's hosted. Not locked to GitHub, GitLab, or any specific Git provider.

Always up to date

We re-check your lock files every time the OSV database is updated — not just when you upload. New CVE published at 3am? You'll know by morning.

Up and running in minutes

No agents, no CLI, no GitHub access required.

01

Upload your lock file

Drop in Cargo.lock, package-lock.json, poetry.lock, go.sum, or others manually — or push directly from your CD pipeline via the REST API. No agent, no CLI, no Git access required.

02

We scan

We match your dependencies against the OSV database — maintained by Google, covering 30+ ecosystems with continuous updates.

03

You get notified

When a new CVE is published that affects your dependencies, you get an alert immediately — through the channel you actually use.

Built by developers,
for developers who care about security

Open-source maintainers

You maintain a library used by thousands. Know the moment a CVE lands in your dependency tree — before your users do.

Indie hackers & freelancers

You run multiple projects. Manually checking lock files before every deploy isn't realistic. Let the alerts come to you.

Small product teams

You don't have a dedicated security engineer. That shouldn't mean zero coverage. Get the same visibility as teams with a full security practice.

Teams using AI coding tools

Copilot, Cursor, and AI agents write code fast — but they don't monitor for new CVEs. oppsy is the safety net for every dependency they introduce.

Simple, affordable pricing — details at launch

No per-seat fees. No enterprise contracts. Serious about staying ahead of vulnerabilities? Get in touch — we'll sort you out.

Join the waitlist

Common questions

What lock file formats are supported?

Cargo.lock, package-lock.json, poetry.lock, uv.lock, go.sum, Maven dependency output, and Gradle lockfiles. More formats are on the roadmap.

Where does the vulnerability data come from?

We use the OSV database — an open, vendor-neutral vulnerability database maintained by Google. It covers 30+ ecosystems and is updated continuously.

Do I need to install anything?

No. You upload a file through the web UI or via REST API. No agent, no CLI, no GitHub App required (though a GitHub App is on the roadmap).

How quickly will I be notified after a CVE is published?

OSV data is synced periodically. Notifications are sent within hours of a new vulnerability being published in the database.

What's the difference between oppsy and Dependabot?

Dependabot works only on GitHub-hosted repositories and supports ~10 ecosystems. Dependabot tracks only the main/master branch. oppsy works with any codebase on any platform, covers 30+ ecosystems, and sends notifications to where you want to (Slack, Discord, Telegram, or any webhook) — not just GitHub PRs.

Stop finding out about vulnerabilities from your users

Join the waitlist. Be among the first to try oppsy when we launch in June 2026.

No spam. No credit card. Unsubscribe anytime.