[go: up one dir, main page]

Product Updates

Engine
Surface
AI Workflows
Area
Release Status

Showing 1 - 10 of 417 updates

snyk_package_health_check for Snyk Studio is now available in Full profile

Improved

Following our previous announcement, snyk_package_health_check is now available in the Full (default) profile for Snyk MCP.

This capability brings Secure at Inception protection to dependency selection in agentic development workflows, enabling AI agents to evaluate open-source packages before they are added to a project using insights from Snyk’s Security Database.

snyk_package_health_check is now generally available and enabled by default for supported ecosystems: npm, PyPI, Maven, NuGet, and Golang.

What’s new

  • Now included in the Full (default) profile - snyk_package_health_check is enabled by default for Snyk-supported MCP workflows.

  • Package health checks across four dimensions: Security, Maintenance, Community, and Popularity.

  • Clear guidance outcomes to help manage agent behavior, including Healthy, Review recommended, Not recommended, and Unknown/insufficient data.

Why this matters

  • Available by default - snyk_package_health_check is now included in the Full profile, so customers get dependency health checks in MCP workflows without additional setup.

  • Ready for production use - With this move to the Full profile, customers can confidently integrate Secure at Inception into their standard development workflows.

If you have any questions, please reach out to the Snyk Support team. To learn more about snyk_package_health_check, visit the Snyk documentation.

Headshot of Noa Yaffe-Ermoza

Noa Yaffe-Ermoza | Product Manager

PR check report is now generally available

General availability

We’ve moved the pull request (PR) check report to general availability (GA). This update includes several enhancements to help you track how your teams adopt security scanning within their workflows. We added Snyk Code errors to the error PR checks, fixed historical calculation discrepancies in adoption metrics, and optimized the underlying tables so that all reporting components load and filter much faster. Additionally, we updated the display of source code manager (SCM) icons to better organize the PR scanning adoption by organization table, and we added PR check data to the Export application programming interface (API), enabling you to programmatically export this information.

We want to provide a reliable, high-performance way for you to verify that security checks are consistently running across your repositories. By moving this to GA, optimizing data loading, and providing API access, we ensure you have accurate, trendable metrics to measure the health of your application security (AppSec) program whether you are using the Snyk Web UI or your own internal reporting tools.

You can now filter and trend PR check adoption metrics by date to see progress over time. If you use GitLab, you will see a notification regarding data prior to February 5, 2025. When viewing the PR scanning adoption by organization table, you will notice a cleaner interface with updated source code manager (SCM) badges. Additionally, you can now automate your reporting workflows by pulling PR check data directly through the Export API.

To learn more, visit Pull Request check reporting in our user documentation.

Introducing Unified Navigation: A Faster Way to Secure Your Application Stack

Improved

Key Capabilities of Unified Navigation

1. A Single Source of Truth The new navigation bar consolidates all Snyk products—Code, Container, IaC, and Cloud—into one sidebar. You can now access the global search to find any project or issue across your entire organization instantly.

2. Context-Aware Shortcuts Snyk now recognizes what you are working on and provides intelligent shortcuts. This reduces the steps for common workflows from 8 clicks down to just 2 or 3, allowing you to move at the speed of development.

3. Developer-First Interface We’ve redesigned the experience to match how developers actually work. This includes Persistent Views; the platform now remembers your filters and workspace settings, so you don't have to rebuild them every time you log in.

4. Simplified Project Management Setting up new scans is now more intuitive. With a visual policy builder and templates, you can configure security rules without editing complex YAML files.

The Core Problem: Navigational Complexity

Currently, finding and understanding a specific security issue requires manual effort and several steps. Users often face:

  • Action Overload: An overwhelming volume of results without a clear path to the most important task.

  • Context Switching: Constant jumping between code, container, and infrastructure views to see the full picture.

  • High "Click Tax": Simple tasks like finding a specific vulnerability can take 8 or more clicks.

Security and development teams often struggle with a common problem: it takes too many clicks to get simple things done. In many environments, security data is scattered across different screens, forcing users to switch between multiple navigation areas to understand their risk.

This fragmentation creates operational friction. Teams spend more time clicking through menus than actually fixing vulnerabilities. To solve this, we are launching the new Snyk Unified Navigation.

This update moves Snyk away from a complex, multi-area interface to a streamlined, consolidated experience. It provides a single point of access for everything in your security program.


The Value to Your Security Program

By unifying the interface, we aim to help organizations achieve three main outcomes:

  • Reduce Triage Time: Cut the time spent reviewing alerts by 60% through better prioritization and faster navigation.

  • Increase Efficiency: Enable developers to find and fix critical issues 85% faster using global search.

  • Scale Security Teams: Allow small security teams to manage significantly more projects by removing manual navigation hurdles.

Snyk 2.0 platform improvements

Headshot of  Maor Kuriel

Maor Kuriel | Director of Product

Tags:

Automatically Close Obsolete Fix Open Source PRs with Help from Snyk

Early access

Nobody likes a cluttered PR backlog. That's why Snyk now automatically closes Open Source Fix PRs if the vulnerabilities they target are no longer present in your project.

Whether a developer manually applied a fix, removed the dependency, or a transitive update resolved the issue, Snyk will catch it during your next recurring test and close the outdated PR. We will also drop a comment on the PR explaining exactly which issues were resolved, ensuring your team always has the right context without the extra noise.

How it works:

  • Snyk checks your open Fix PRs during your regular recurring tests.

  • If the targeted issues are gone—whether the dependency was removed, updated transitively, or fixed manually—the PR is automatically closed.

  • Snyk leaves a comment on the PR listing the resolved issues so your team knows exactly why it was closed.

This update gives you a cleaner, more actionable PR pipeline with zero extra effort.

Get Started Today This feature is going live as an opt-in starting today. Just navigate to the Snyk Preview panel to get started, and we'll begin closing up to five obsolete PRs from your backlog per day. As we move towards General Availability, we'll be bringing you the ability to configure that daily limit to best suit your team's workflow.

Please note that this feature is opt-in for Early Access, but once we move to General Availability, it will move to opt-out. This feature is tentatively scheduled to move to General Availability on June 15, 2026.

And stay tuned—there is a lot more to come in our ongoing efforts to revolutionize the Snyk PR experience!

Headshot of  Ryan McMorrow

Ryan McMorrow | Product Lead, Remediation

Tags:

Active Security Incident Assessment

Improved

We’ve launched an Active security incident assessment banner to help you manage major zero-day events. When our Security team identifies a high-severity zero-day vulnerability in a widely used package, we’ll trigger a dedicated banner at the top of the Zero Day report. This assessment provides a look at your exposure, including the total number of assets needing triage, assets cleared, and the specific open-source (OSS) packages involved.

During a newly discovered security incident, teams need to quickly determine which assets may be affected and where to start investigating.

The active security incident assessment provides earlier visibility into repository exposure, helping teams:

  • Understand the potential blast radius of an incident

  • Identify assets requiring investigation

  • Prioritize remediation and response faster

During an active indecent, you can now immediately see which assets may contain vulnerable packages through the assets needing triage metric. As you remove or update impacted dependencies, SCM-based scans for Snyk Open Source will automatically move those repositories to assets cleared, giving you a record of your progress.

To learn more, visit Zero-Day report in our user documentation.

Headshot of Sara Meadzinger

Sara Meadzinger | Staff Product Manager

Snyk Learn lesson roundup: what’s new in April

New

We’ve added new secure coding content, Snyk platform training, and expanded Snyk Learn coverage to help your security engineers and developers stay ahead of the latest risks.

We’ve included direct links to every new and updated lesson so you can easily share them with your team. You can also assign them directly through the Snyk Learning Management Add-On.

Security lessons

Snyk platform lessons

Expanded framework & language coverage

We’ve also expanded Snyk Learn content to cover more of your tech stack:

Headshot of Alex Ley

Alex Ley | Director, Snyk Learn

Enhanced issue filtering for the export API

Improved

We're updating the stable Export API (version 2024-10-15) to include more granular filtering for the issues dataset. You can now filter your export request payloads using additional parameters, including issue status, issue type, and project origin. We've also added support for advanced filters such as common vulnerabilities and exposures (CVE) ID, reachability, and National Vulnerability Database (NVD) severity to help you refine your reporting.

We want to make data consumption more manageable and relevant for your specific workflows. Previously, these fields were available as export columns but could not be used to filter the initial request. By adding these parameters directly to the API contract, we're enabling you to reduce noise and achieve parity between our user interface (UI) reporting and your automated exports.

You can now customize your issue exports by applying the following new filters to your API requests:

  • ISSUE_STATUS: Filter by Open, Resolved, or Ignored.

  • ISSUE_TYPE: Limit results to vulnerabilities or licenses.

  • PROJECT_ORIGIN: Filter by source, such as CLI, GitHub, or Jenkins.

  • PROJECT_TARGET_REF: Target specific branches or artifacts.

  • CVE: Search for a specific vulnerability ID.

  • NVD_SEVERITY: Filter based on external severity ratings.

  • REACHABILITY: Separate reachable from unreachable vulnerabilities.

  • PROJECT_TARGET_DISPLAY_NAME: Use human-readable names for your reports.

To learn more, visit Export in our user documentation.

Headshot of Sara Meadzinger

Sara Meadzinger | Staff Product Manager

Track your monitored projects with a new analytics widget

General availability

We’re adding an analytics overview widget that tracks the total number of Snyk projects being monitored. This key performance indicator (KPI) is available in the Widget selector, allowing you to add it to your saved dashboards. This update helps you visualize the total count of projects being continuously monitored for open-source vulnerabilities and license issues, after you use the snyk monitor command.

We want to provide better visibility into the scale of your security program. By adding a dedicated KPI for monitored projects, we make it easier for you to track the coverage of your continuous monitoring.

After you log in, navigate to your analytics dashboard and open the Widget selector. Select the new Projects Monitored KPI to add it to a Saved dashboard. This provides an immediate view of how many projects are being continuously monitored for vulnerabilities and license issues.

To learn more, visit Analytics or Snyk CLI commands in our user documentation.

Headshot of Sara Meadzinger

Sara Meadzinger | Staff Product Manager

Export table data to CSV with Snyk API & Web

New

We’re introducing a new Download CSV feature to help you export your data directly from the interface. Starting today, you can download a comma-separated values (CSV) file that matches your current table view, including any active filters or hidden columns. We'll follow this implementation soon after, with an enhanced version that gives you even more flexibility, by allowing you to choose from a wider range of fields, which ones to include in your CSV file. 

We recognize that managing security data often requires analysis outside of our platform. Previously, moving table data into other tools required manual effort or copy-pasting. We're adding this functionality to save you time and provide a powerful way to leverage your data for custom reporting and internal manipulation without the manual overhead.

This feature is available to all users across all account plans. If you have access to a table, you can now download its data.

To learn more, visit How to export table data to CSV in our user documentation.

Headshot of Ana Pascoal

Ana Pascoal | Product Manager

Tags:

Updates to finding management permissions at Snyk API & Web

Improved

We're introducing a new permission called Change Finding State to give you more granular control over how your teams manage security findings. Previously, the Change Finding permission covered several actions: changing a finding's state, review status, assignee, labels, and adding notes. We've separated these capabilities so that Change Finding State now specifically handles changing a finding's state and review status, and the existing Change Finding permission now focuses on managing assignees, labels, and notes. To prevent any workflow interruptions, all built-in and existing custom roles that currently have the Change Finding permission will automatically receive the new Change Finding State permission.

We made this change to help you better implement the principle of least privilege within your security programs. We heard that many organizations need to allow team members to contribute to the triage process — such as by adding notes or labels — without granting them the authority to officially ignore a finding or accept a risk. By decoupling these actions, we provide the flexibility to define more specific roles for your developers and security analysts.

You can now create custom roles that allow users to add context to findings without giving them the ability to change the security posture of an application. For example, if you want a user to be able to add notes to a finding, you can assign them the View Target and Change Finding permissions, but if you want a user to be able to ignore or accept findings, they will now require the Change Finding State permission. While this update does not change current access for existing users, we recommend reviewing your custom roles to see if you can further restrict permissions.

To learn more, visit Understanding Permissions at Snyk API & Web in our user documentation.

Headshot of Ana Pascoal

Ana Pascoal | Product Manager

Tags: