Myrror Security Logo

πŸ‘‹ Introduction

Welcome to Myrror Security!

image1

Our documentation is divided into 3 main sections:

Getting Started - sign in, get acquianted with the Myrror Security platform and understand how binary-to-source reachability analysis works in practice.

Supply Chain Attack Detection - learn about all the different types of attacks that Myrror detects & defends against, including typosquatting, dependency confusion, CI/CD attacks and more.

The Myrror Engines - dive deeper into the technologies that make up the Myrror platform's backend, including our Reacahbility, Exploitability and Integrity engines - responsible for accurate & reliable threat detection, and our automatic remediation plan generator.

On this page

No Headings