Aikido Security has launched Aikido Endpoint, a new security agent designed to protect developer devices from software supply chain attacks. The tool addresses escalating risks from unvetted packages, extensions, and the widespread adoption of AI coding tools. This launch aims to secure the modern development environment by inspecting and blocking threats before they are installed on a developer's machine.
The Escalating Threat Landscape
The release of Aikido Endpoint comes amid a historic surge in open source supply chain compromises. Recent incidents, such as the attacks on Axios and other major projects, highlight the vulnerability of developer devices. These machines are prime targets as they hold credentials, access keys, and source code, making them a critical entry point into an organization's infrastructure.
The threat is compounded by the proliferation of AI, which has lowered the barrier for creating sophisticated malware. According to Aikido, its threat intelligence engine now identifies over 100,000 malicious packages daily, a fivefold increase from the previous year. AI coding agents also expand the attack surface by autonomously adding dependencies, making manual oversight nearly impossible for security teams.
Introducing Aikido Endpoint
Aikido Endpoint operates as a lightweight agent directly on the developer's device, offering a new layer of defense. It works by monitoring every installation across the machine, from package managers like npm and PyPI to IDE and browser extensions. The agent inspects each component against a threat intelligence feed and blocks known malware before it can compromise the system.
A key feature is its proactive stance, automatically blocking any package published within the last 48 hours to mitigate zero-day threats. This enterprise-grade solution builds upon Aikido's popular open-source tool, Safe Chain, adding granular access controls and approval workflows. It provides comprehensive governance over the tools and dependencies entering the development ecosystem.
A Developer-First Security Approach
The product is designed to integrate seamlessly into developer workflows without causing friction or delays. Aikido Endpoint runs silently in the background, allowing clean installations to proceed without interruption while blocking malicious ones. Madeline Lawrence, CGO at Aikido, stated the goal is for developers to ship fearlessly, only becoming aware of the tool when it prevents a serious attack.
This approach contrasts sharply with traditional security models that often hinder productivity. Many organizations either enforce strict lockdowns that developers circumvent or adopt a permissive strategy that invites risk. Aikido aims to provide robust security that scales with the rapid pace of AI-accelerated development cycles without forcing these trade-offs.
Aikido's Rapid Ascent
Founded in Ghent, Belgium, Aikido Security has experienced remarkable growth since its inception. The company recently secured a $60 million Series B funding round, achieving a $1 billion valuation and becoming one of the fastest cybersecurity firms in Europe to reach unicorn status. This rapid scaling is attributed to a highly focused culture that prioritizes end-to-end ownership among its team members.
The company, co-founded by CEO Willem Delbare, has expanded its presence with offices in the UK and San Francisco. Aikido also demonstrates a commitment to transparency by open-sourcing its supply chain research and threat intelligence feed. This allows the broader community to benefit from its real-time detection of malware and vulnerable packages.
The launch of Aikido Endpoint marks a significant step in securing the software supply chain at its most vulnerable point: the developer's workstation. By providing invisible, real-time protection against a growing wave of AI-fueled threats, Aikido is addressing a critical security gap. This positions the company to play a pivotal role in enabling safe and efficient software development in an increasingly complex digital landscape.

