EveryDev.ai
Sign inSubscribe
Explore AI Tools
  • AI Coding Assistants
  • Agent Frameworks
  • MCP Servers
  • AI Prompt Tools
  • Vibe Coding Tools
  • AI Design Tools
  • AI Database Tools
  • AI Website Builders
  • AI Testing Tools
  • LLM Evaluations
Follow Us
  • X / Twitter
  • LinkedIn
  • Reddit
  • Discord
  • Threads
  • Bluesky
  • Mastodon
  • YouTube
  • GitHub
  • Instagram
Get Started
  • About
  • Editorial Standards
  • Corrections & Disclosures
  • Community Guidelines
  • Advertise
  • Contact Us
  • Newsletter
  • Submit a Tool
  • Start a Discussion
  • Write A Blog
  • Share A Build
  • Terms of Service
  • Privacy Policy
Explore with AI
  • ChatGPT
  • Gemini
  • Claude
  • Grok
  • Perplexity
Agent Experience
  • llms.txt
Theme
With AI, Everyone is a Dev. EveryDev.ai © 2026
Main Menu
  • Tools
  • Developers
  • Topics
  • Discussions
  • Communities
  • News
  • Podcasts
  • Blogs
  • Builds
  • Contests
  • Compare
  • Arena
Create
    Home
    Tools

    2,408+ AI tools

    • New
    • Trending
    • Featured
    • Compare
    • Arena
    Categories
    • Agents1573
    • Coding1176
    • Infrastructure524
    • Marketing445
    • Design422
    • Projects381
    • Research354
    • Analytics328
    • Testing219
    • MCP210
    • Data203
    • Security192
    • Integration168
    • Learning154
    • Communication145
    • Prompts140
    • Extensions135
    • Commerce123
    • Voice122
    • DevOps98
    • Web76
    • Finance21
    1. Home
    2. Tools
    3. Bumblebee
    Bumblebee icon

    Bumblebee

    Application Security
    Featured

    Read-only inventory collector for package, extension, and developer-tool metadata on macOS and Linux endpoints, built for fast supply-chain exposure checks.

    Visit Website

    At a Glance

    Pricing
    Open Source

    Free and open-source under Apache License 2.0. Install via go install or build from source.

    Engagement

    Available On

    macOS
    Linux
    VS Code
    CLI

    Resources

    WebsiteDocsGitHubllms.txt

    Topics

    Application SecurityCode SecurityMCP Tools

    Alternatives

    HackerOne CodeZeroLeaksGuardix
    Developer
    Perplexity AIPerplexity AI builds AI-powered search and developer tools,…

    Listed May 2026

    About Bumblebee

    Bumblebee is an open-source, read-only inventory collector built by Perplexity AI and published under the Apache License 2.0. It targets macOS and Linux developer endpoints and answers a specific supply-chain response question: when an advisory names a package, extension, or version, which developer machines show a match in their on-disk metadata right now? The project is written in Go, ships as a single static binary with zero non-stdlib dependencies, and was first released in May 2026.

    What It Is

    Bumblebee sits in the gap between SBOMs (what shipped) and EDR tools (what ran or touched the network). It focuses on the messy local state that neither category covers well: lockfiles, package-manager install metadata, extension manifests, and developer-tool configs scattered across developer workstations. It reads that on-disk state, converts it into structured NDJSON component records, and — when given an exposure catalog — flags exact matches so incident responders can quickly identify affected machines without executing package managers or reading source files.

    Architecture and Scope

    The tool is deliberately narrow and read-only:

    • Single static binary compiled with Go 1.25+, zero non-stdlib dependencies.
    • Three scan profiles — baseline, project, and deep — for different populations and cadences.
    • No package manager execution: it never runs npm ls, pip show, go list, or similar commands.
    • MCP config safety: parses MCP host configs for server inventory but explicitly does not emit environment values or credentials found in env blocks.

    Supported ecosystems include npm (via package-lock, pnpm-lock, yarn.lock, bun.lock), PyPI (dist-info/METADATA), Go modules (go.sum/go.mod), RubyGems (Gemfile.lock), Composer (composer.lock), MCP server configs, VS Code/Cursor/Windsurf/VSCodium editor extensions, and Chromium/Firefox browser extensions.

    Output Model

    Every scan emits NDJSON records — one per line — with a scan_summary record at the end. Package records carry a confidence field (high, medium, or low) reflecting how reliably identity and version were established. Finding records are emitted when a package matches an entry in a supplied exposure catalog, including fields for severity, catalog ID, matched version, and source file. Record IDs are content-addressed hashes of a canonical identity tuple, making them stable across runs for deduplication on the receiver side.

    Exposure Catalog Format

    Bumblebee uses a minimal JSON catalog format for exposure matching — exact (ecosystem, name, version) tuples only. The repository ships a threat_intel/ directory containing maintained exposure catalogs built from public threat-intelligence reporting on recent supply-chain campaigns. According to the repository README, these catalogs are assembled with Perplexity Computer and updated via pull requests as new campaigns are reported.

    Update: v0.1.1

    The latest release is v0.1.1, published on 2026-05-22, just two days after the repository was created on 2026-05-20. The repository had accumulated 165 stars and 8 forks within days of launch, and the project's GitHub topics — golang, package-inventory, supply-chain-security — reflect its focused positioning. The selftest subcommand provides a built-in end-to-end smoke test against embedded fixtures, useful for validating fleet rollouts without network calls.

    Bumblebee - 1

    Community Discussions

    Be the first to start a conversation about Bumblebee

    Share your experience with Bumblebee, ask questions, or help others learn from your insights.

    Pricing

    OPEN SOURCE

    Open Source

    Free and open-source under Apache License 2.0. Install via go install or build from source.

    • Single static binary, zero non-stdlib dependencies
    • Three scan profiles: baseline, project, deep
    • NDJSON structured output
    • Exposure catalog matching
    • Supports npm, PyPI, Go, RubyGems, Composer, MCP, editor and browser extensions

    Capabilities

    Key Features

    • Read-only on-disk inventory collection (no package manager execution)
    • Three scan profiles: baseline, project, deep
    • NDJSON structured output with per-record confidence levels
    • Exposure catalog matching for exact (ecosystem, name, version) lookups
    • Single static binary, zero non-stdlib dependencies
    • Supports npm, pnpm, Yarn, Bun, PyPI, Go modules, RubyGems, Composer, MCP, editor extensions, browser extensions
    • MCP host config parsing without emitting credentials or env values
    • Content-addressed record IDs stable across runs for deduplication
    • Built-in selftest subcommand with embedded fixtures
    • HTTPS and file transport output options
    • Maintained threat_intel/ exposure catalogs from public supply-chain reporting
    • Version stamping via ldflags for traceable production builds

    Integrations

    VS Code
    Cursor
    Windsurf
    VSCodium
    Chromium-family browsers
    Firefox
    Claude Desktop (MCP config)
    Gemini CLI / Code Assist (MCP config)
    Cline (MCP config)
    npm
    pnpm
    Yarn
    Bun
    PyPI
    Go modules
    RubyGems
    Composer

    Reviews & Ratings

    No ratings yet

    Be the first to rate Bumblebee and help others make informed decisions.

    Developer

    Perplexity AI

    Perplexity AI builds AI-powered search and developer tools, including the Perplexity answer engine and open-source utilities for supply-chain security. The team publishes Bumblebee, a read-only inventory collector for developer endpoints, under the Apache 2.0 license. Perplexity also maintains threat intelligence catalogs assembled with Perplexity Computer and updated via community pull requests.

    Read more about Perplexity AI
    WebsiteGitHub
    1 tool in directory

    Similar Tools

    HackerOne Code icon

    HackerOne Code

    Expert code review and security guidance platform that catches vulnerabilities earlier in development with AI and human expert review.

    ZeroLeaks icon

    ZeroLeaks

    Enterprise-grade AI security platform that protects system prompts from extraction and injection attacks by red-teaming your AI before adversaries do.

    Guardix icon

    Guardix

    AI-powered Solidity smart contract audit platform with multi-model analysis, architecture mapping, and exploit verification on forked chains.

    Browse all tools

    Related Topics

    Application Security

    AI tools for securing software applications and identifying vulnerabilities.

    67 tools

    Code Security

    Tools that analyze code for security vulnerabilities and issues.

    32 tools

    MCP Tools

    Tools built with the Model Context Protocol for specific tasks.

    51 tools
    Browse all topics
    Back to all tools
    Discussions