
No traffic data available yet
Data is sourced from SimilarWeb
Runtime security for developers and AI agents. EDAMAME watches what code does on your machine — not what it claims to be. It detects credential harvesting, C2 beaconing, and temp-directory execution through behavioral invariants that hold across every supply chain attack variant. Four independent detection layers, 60-second cycles, zero configuration. Proven against Trivy, LiteLLM, and axios hacks. Free, open source, works on macOS/Windows/Linux.
EDAMAME Security 是 Runtime security for developers and AI agents. EDAMAME watches what code does on your machine — not what it claims to be. It detects credential harvesting, C2 beaconing, and temp-directory execution through behavioral invariants that hold across every supply chain attack variant. Four independent detection layers, 60-second cycles, zero configuration. Proven against Trivy, LiteLLM, and axios hacks. Free, open source, works on macOS/Windows/Linux.
是的,EDAMAME Security 免费使用。
EDAMAME Security 的热门替代品包括 Agent Simulate, Aikido Security, cubic, Preswald。可在上方比较它们的月流量和功能。