Skip to content

Perplexity opens Bumblebee to scan developer machines without running code

Original: Perplexity is open-sourcing Bumblebee View original →

Read in other languages: 한국어日本語
AI May 24, 2026 By Insights AI 2 min read 1 views Source

Supply-chain response now has to reach the developer laptop, not just the repository. In a May 22 post, Perplexity released Bumblebee as an open-source, read-only scanner for macOS and Linux machines used by developers.

The tool was built inside Perplexity to protect the development systems behind Perplexity, Comet, and Computer. Its purpose is narrow but practical: when a new advisory flags a compromised package, extension, or AI-tool configuration, security teams need to know which machines and workspaces were actually exposed.

Bumblebee checks four surfaces that are often split across separate tools. For language package managers, it covers npm, pnpm, Yarn, Bun, PyPI, Go modules, RubyGems, and Composer. For AI agent setups, it inspects MCP configuration. For editor extensions, it covers the VS Code family, including VS Code, Cursor, Windsurf, and VSCodium. For browsers, it includes Chromium-family browsers such as Chrome, Comet, Edge, Brave, and Arc, as well as Firefox.

The read-only design is the important technical choice. Perplexity says Bumblebee reads metadata directly and does not invoke package managers such as npm, pnpm, bun, or pip. It also avoids install scripts, lifecycle hooks, application source files, and process or network monitoring. That matters because many recent supply-chain attacks spread through postinstall scripts. A scanner that calls the package manager can become the thing that triggers the attack it is trying to detect.

Perplexity’s internal workflow also shows how AI tooling is being folded into security operations. A threat signal can come from public disclosure, third-party intelligence, or internal research. Perplexity Computer drafts a catalog update with ecosystem, package, and version data, then opens a GitHub pull request with source links. A human review gates the catalog change before Bumblebee scans endpoints and sends results to the security team.

Bumblebee is not an EDR and does not claim to remediate infections. Its value is exposure mapping: which developer systems contain a risky package, extension, MCP config, or browser add-on after a supply-chain signal lands. For AI companies putting agents, browsers, and local tools deeper into production workflows, that inventory layer is becoming part of product security rather than a back-office checklist.

Share: Long

Related Articles

AI 1d ago 1 min read

GitHub confirmed on May 20, 2026 that threat group TeamPCP exfiltrated approximately 3,800 internal repositories after a GitHub employee installed a trojanized Nx Console VS Code extension that was live on the marketplace for just 11 minutes. Stolen credentials include 1Password vaults, Anthropic Claude Code configurations, npm, GitHub, and AWS tokens; TeamPCP is seeking $50,000 for the data on underground forums.

Comments (0)

No comments yet. Be the first to comment!

Leave a Comment