A New Superhero
for Your CI/CD Pipeline

The easiest way for your team to monitor & prevent supply chain attacks in your CI pipeline before they happen.

Get Started
hero table
powered by cycode
real time icon

Boost your build security with a Real-Time solution

Easily Secure Your CI/CD Pipelines with Our Lightweight eBPF-Based Runtime Security Solution, Detecting and Preventing Real-Time Threats Including Zero-Day Attacks.

Comprehensive Security

Defend against a range of modern attacks, including TypoSquatting, malicious dependencies, and code injections.

Instant Threat Detection

Swiftly identifies and thwarts software supply-chain attacks, including recent high-profile incidents like SolarWinds and CodeCov.

Powered by eBPF

With eBPF sensors, attacks are proactively monitored and blocked at the kernel level, thwarting them before any harm can be done.

Privacy First

Protect your build with minimal data transfer - only essential information is uploaded, with no source code sharing.

Developer Friendly

View security reports directly within your developer environment, with seamless integration into your pipelines.

Free License

Boost the security of your project with Cimon's free offering

plugin icon

Plug-In, and let Cimon take the lead

Easily Integrates with Your Workflows, Compatible with Modern CI Systems.

Update Your Workflow

With just a few clicks, you'll be able to enjoy the peace of mind that comes with comprehensive pipeline protection.

FAQ's

Who is Cimon?

Cimon the beaver was a master builder who loved nothing more than working with his paws and teeth to create something new. One day, he noticed that the software developers in his community were struggling with supply-chain attacks, and he knew he had to help.

With his sharp teeth and keen senses, Cimon built a runtime security solution that could detect and prevent these attacks, using eBPF technology to monitor the system and protect against threats.

How does Cimon prevent supply-chain attacks?

Cimon prevents supply-chain attacks by monitoring and preventing the golden pillars of CI/CD pipeline security: process execution, network access, and file access. It enables you to detect a breach, identify a compromised pipeline runner, deny access to the source code, and mitigate exfiltration attempts.

What is eBPF technology?

Extended Berkeley Packet Filter (eBPF) is a revolutionary technology that enables the Linux kernel to execute custom programs within the kernel context safely. eBPF is highly efficient and allows developers to write code that can be run inside the kernel without needing kernel modifications or the risk of crashing the system. In the context of Cimon, eBPF is used to monitor and mitigate attacks within the kernel.

How to build the right security policy in Cimon?

First, you should go through the learning phase and run Cimon in detect mode to monitor the CI pipeline behavior. The Cimon report will suggest the correct security policy to apply for the prevention phase. Once applied, any deviation will be terminated, leaving your pipeline harmless.

What is the pricing of Cimon?

Cimon is totally free! So get started and unleash the power of the beaver!

How does Cimon protect users' privacy?

We prioritize the privacy of our users and only collect the necessary information to enhance their experience and improve our product. We utilize this information to present the report findings to the user on the Cimon platform and to assist the user in creating project-specific security policies. Please refer to our privacy policy for more details on our privacy practices, including data collection, usage, protection, and user rights.

Which CI/CD platforms does Cimon support?

Cimon supports various CI platforms like GitHub Actions, Azure Pipelines, and Jenkins. You can find the complete support list here.