Frequently asked questions
Discover how Seal Security identifies and patches open source vulnerabilities without breaking changes.
Seal Security delivers one-click, backported, compatible patches for existing versions of open source packages. Seal identifies and fixes vulnerabilities across Linux OS, base images, and application dependencies, including EOL and legacy systems. Seal’s approach reduces technical debt, prevents risk downtime, and helps teams ship faster, without breaking changes or compromising security and compliance posture.
The typical proof-of-value includes the customer selecting a test project, us providing the remediated versions for several vulnerable packages, and the customer testing it to see that everything works as expected. The entire process shouldn’t take more than 2-3 weeks.
Yes, with the Seal platform you can detect vulnerable packages in your source code, or as part of your CI pipeline.
Seal Security’s patches do not affect your organization’s licensing requirements. Our patches are released with a permissive license, however you still must abide by the requirements of the original package’s license.
Seal Security offers 24/7 support, including direct Slack/Teams channels with our customers.
We currently have support for Java, Python, JavaScript, C/C++, Go, PHP, C#, and Ruby.
The Seal platform supports a variety of integrations with existing security scanners. These scanners will then know that a specific vulnerability in a specific package was remediated by Seal Security, and present it accordingly.
Seal OS supports all of the above - containers, virtual machines as well as bare metals.
As a rule, we use the community fixes with the minimal necessary changes. Our fixes are tiny, usually fewer than 10 lines-of-code, compared with the hundreds or thousands of lines that change in a typical version upgrade, thereby dramatically reducing the risk of unforeseen side effects.
All our remediated versions undergo thorough testing and quality assurance processes, including manual inspection by our vulnerability research team, and by a dedicated AI tool that verifies there are no breaking changes.
And, since our platform runs at build-time, all of your existing tests run on our remediated version, providing an extra layer of assurance.
Other AppSec tools usually focus on visibility, providing you with a list of your open source vulnerabilities, or on prioritization, trying to creatively arrange that list. At Seal Security we focus on remediation, actually fixing the underlying vulnerabilities for you, clearing the list instead of just shuffling it around.
We handle all critical and high rated vulnerabilities within 72 hours of being made public. Lower rated vulnerabilities are handled in accordance with the contractually agreed SLA.
Seal Security is certified with SOC 2 Type II and ISO 27001
We don’t have a hard limit for how far back we support. As long as the source code is publicly available, we can fix it.
The best method is to contact us via the joint Slack/Teams channel we have with your organization. You can also email support@sealsecurity.io. For urgent cases you can email emergency@sealsecurity.io which will immediately trigger our on-call support.
There are 2 main ways (which you can read about more in our documentation):
- Use Seal as an artifact server - the developers specify the sealed versions in the requirements files, and the package manager pulls them from our server.
- Incorporate the Seal CLI into your CI pipeline - immediately after pulling the packages as you would do normally, our tool will replace the vulnerable packages with their remediated versions according to preset instructions. These instructions can be found either:
- In a configuration file in the project’s git repository, controlled by the developers.
- On the Seal server, allowing security teams to independently remediate vulnerabilities without needing permissions to the source code.
None! We’re entirely a build-time solution, so no permissions are necessary.
Yes, while our solution works best as a SaaS solution, it’s possible to use our remediated versions in an on-prem setup.
If the choice were simply between always staying on the latest version or never upgrading, we wouldn’t be having this conversation. The real question is whether you patch vulnerabilities or live with the risk. Staying on the latest version sounds ideal, but in practice, it’s often not feasible due to compatibility issues, breaking changes, and operational constraints. That’s why Seal Security helps you remediate vulnerabilities without disrupting your software.
For a deeper dive into why “new” isn’t always better, check out our blog post - https://www.seal.security/blog/keeping-your-open-source-dependencies-vulnerability-free-beyond-version-chasing

