π Introduction
Welcome to Myrror Security!
Our documentation is divided into 3 main sections:
Getting Started - sign in, get acquianted with the Myrror Security platform and understand how binary-to-source reachability analysis works in practice.
Supply Chain Attack Detection - learn about all the different types of attacks that Myrror detects & defends against, including typosquatting, dependency confusion, CI/CD attacks and more.
The Myrror Engines - dive deeper into the technologies that make up the Myrror platform's backend, including our Reacahbility, Exploitability and Integrity engines - responsible for accurate & reliable threat detection, and our automatic remediation plan generator.