HomeCompaniesXeol

Xeol

Close your outdated dependency attack vector

Pronounced Zee-O-L. End-of-life (EOL) and outdated software are a black box of vulnerabilities with very limited remediation paths. These 2 factors combine to make managing them a necessary proactive practice. Xeol enables enterprises and Fortune 500s to create a proactive EOL management program that directly contributes to better vulnerability management and lower cyber insurance.
Xeol
Founded:2023
Team Size:3
Location:New York
Group Partner:Dalton Caldwell

Former Founders

ShiHan Wan

CEO @ Xeol. Backend Engineer. Previously helped build 2 startups from early to 🦄, now doing that for Xeol.
ShiHan Wan
ShiHan Wan
Xeol

Benji Visser

CTO @ Xeol. Ex-Datadog. Ex-Ada. Canadian
Benji Visser
Benji Visser
Xeol

Company Launches

bumpgen generates fixes for breaking changes in version upgrades with AI

  • 🧑🏼‍💻 bumpgen <package> <new-version> to get fixes to your version bump breaking changes
  • 🔑 Bring your own OpenAI API key
  • 🌐 Supports Typescript codebases

Why build bumpgen?

Keeping your dependencies updated is a good security and engineering practice (just not too up-to-date, thanks xz 🙏🏼). But they can be a pain to actual perform because:

  • Major version bumps have breaking changes and no one wants to fix them.
  • 25% minor version bumps have breaking changes as well (semver isn’t perfect)
  • There can be a lot of version bumps from small packages to large frameworks

How Does bumpgen work?

bumpgen is pretty straight forward:

  • BUMP your dependency version then GENerate the fixes for the breaking changes
  • Quick to get started with npm install -g bumpgen
  • Works on top of your Dependabot or Renovate to take care of those gnarly breaking changes

If you are curious how bumpgen identifies, fixes, then propagates the breaking change fix, we added bumpgen’s architecture and design decisions here 👈

How to start?

Other Company Launches

🌌 Xeol - Modern platform for software supply chain security

Cut through the noise, identify and remediate risks, then enforce security policies
Read Launch ›

Company Photo

Company Photo