Founded Year

2022

Stage

Series B | Alive

Total Raised

$78M

Last Raised

$50M | 8 mos ago

Mosaic Score
The Mosaic Score is an algorithm that measures the overall financial health and market potential of private companies.

+131 points in the past 30 days

About Oligo

Oligo focuses on runtime application security and offers solutions for scanning and monitoring, supply chain security, application vulnerability management, and attack detection and response. It was founded in 2022 and is based in Tel Aviv, Israel.

Headquarters Location

Haarbaa 28

Tel Aviv, 6473921,

Israel

Loading...

Loading...

Latest Oligo News

Critical mcp-remote Vulnerability Enables Remote Code Execution, Impacting 437,000+ Downloads

Jul 11, 2025

Critical mcp-remote Vulnerability Enables Remote Code Execution, Impacting 437,000+ Downloads Like Jul 10, 2025Ravie LakshmananVulnerability / AI Security Cybersecurity researchers have discovered a critical vulnerability in the open-source mcp-remote project that could result in the execution of arbitrary operating system (OS) commands. The vulnerability, tracked as CVE-2025-6514, carries a CVSS score of 9.6 out of 10.0. “The vulnerability allows attackers to trigger arbitrary OS command execution on the machine running mcp-remote when it initiates a connection to an untrusted MCP server, posing a significant risk to users – a full system compromise,” Or Peles, JFrog Vulnerability Research Team Leader, said. Mcp-remote is a tool that sprang forth following Anthropic’s release of Model Context Protocol (MCP), an open-source framework that standardizes the way large language model (LLM) applications integrate and share data with external data sources and services. It acts as a local proxy, enabling MCP clients like Claude Desktop to communicate with remote MCP servers, as opposed to running them locally on the same machine as the LLM application. The npm package has been downloaded more than 437,000 times to date. The vulnerability affects mcp-remote versions from 0.0.5 to 0.1.15. It has been addressed in version 0.1.16 released on June 17, 2025. Anyone using mcp-remote that connects to an untrusted or insecure MCP server using an affected version is at risk. “While previously published research has demonstrated risks from MCP clients connecting to malicious MCP servers, this is the first time that full remote code execution is achieved in a real-world scenario on the client operating system when connecting to an untrusted remote MCP server,” Peles said. The shortcoming has to do with how a malicious MCP server operated by a threat actor could embed a command during the initial communication establishment and authorization phase, which, when processed by mcp-remote, causes it to be executed on the underlying operating system. While the issue leads to arbitrary OS command execution on Windows with full parameter control, it results in the execution of arbitrary executables with limited parameter control on macOS and Linux systems. To mitigate the risk posed by the flaw, users are advised to update the library to the latest version and only connect to trusted MCP servers over HTTPS. “While remote MCP servers are highly effective tools for expanding AI capabilities in managed environments, facilitating rapid iteration of code, and helping ensure more reliable delivery of software, MCP users need to be mindful of only connecting to trusted MCP servers using secure connection methods such as HTTPS,” Peles said. “Otherwise, vulnerabilities like CVE-2025-6514 are likely to hijack MCP clients in the ever-growing MCP ecosystem.” The disclosure comes after Oligo Security detailed a critical vulnerability in the MCP Inspector tool (CVE-2025-49596, CVSS score: 9.4) that could pave the way for remote code execution. Earlier this month, two other high-severity security defects were uncovered in Anthropic’s Filesystem MCP Server, which, if successfully exploited, could let attackers break out of the server’s sandbox, manipulate any file on the host, and achieve code execution. The two flaws, per Cymulate, are listed below – CVE-2025-53110 (CVSS score: 7.3) – A directory containment bypass that makes it possible to access, read, or write outside of the approved directory (e.g., “/private/tmp/allowed_dir”) by using the allowed directory prefix on other directories (e.g., “/private/tmp/allow_dir_sensitive_credentials”), thereby opening the door data theft and possible privilege escalation CVE-2025-53109 (CVSS score: 8.4) – A symbolic link (aka symlink) bypass stemming from poor error handling that can be used to point to any file on the file system from within the allowed directory, allowing an attacker to read or alter critical files (e.g., “/etc/sudoers”) or drop malicious code, resulting in code execution by making use of Launch Agents, cron jobs, or other persistence techniques Both shortcomings impact all Filesystem MCP Server versions prior to 0.6.3 and 2025.7.1, which include the relevant fixes. “This vulnerability is a serious breach of the Filesystem MCP Servers security model,” security researcher Elad Beber said about CVE-2025-53110. “Attackers can gain unauthorized access by listing, reading or writing to directories outside the allowed scope, potentially exposing sensitive files like credentials or configurations.” “Worse, in setups where the server runs as a privileged user, this flaw could lead to privilege escalation, allowing attackers to manipulate critical system files and gain deeper control over the host system.” Found this article interesting? Follow us on Twitter  and LinkedIn to read more exclusive content we post.

Oligo Frequently Asked Questions (FAQ)

  • When was Oligo founded?

    Oligo was founded in 2022.

  • Where is Oligo's headquarters?

    Oligo's headquarters is located at Haarbaa 28, Tel Aviv.

  • What is Oligo's latest funding round?

    Oligo's latest funding round is Series B.

  • How much did Oligo raise?

    Oligo raised a total of $78M.

  • Who are the investors of Oligo?

    Investors of Oligo include Ballistic Ventures, Lightspeed Venture Partners, TLV Partners, Greenfield Partners, Strait Capital Investment Group and 19 more.

  • Who are Oligo's competitors?

    Competitors of Oligo include Vicarius, Aqua Security, Kodem Security, EdgeBit, Snyk and 7 more.

Loading...

Compare Oligo to Competitors

Chainguard Logo
Chainguard

Chainguard operates within the cybersecurity and software supply chain security sectors. The company offers hardened container images that aim to reduce vulnerabilities and integrate into security processes. Its solutions provide tools for vulnerability remediation, compliance, and risk mitigation, and the security of artificial intelligence and machine language workloads. It was founded in 2021 and is based in Kirkland, Washington.

Snyk Logo
Snyk

Snyk operates in the technology sector and provides a platform for code security, open source vulnerability management, container environment protection, and infrastructure as code misconfiguration resolution. Its services offered by Snyk include continuous monitoring and actionable fix advice. It was founded in 2015 and is based in Boston, Massachusetts.

Ox Security Logo
Ox Security

Ox Security specializes in software supply chain security solutions. The company offers services that help manage security risks in the software development process, including automating protective actions, managing security findings from a single location, and ensuring the security and integrity of all cloud artifacts. It primarily serves the software development and cloud computing industries. It was founded in 2021 and is based in Tel Aviv, Israel.

B
Binarly

Binarly specializes in firmware security and supply chain risk management within the cybersecurity industry. The company offers an AI-powered platform that detects and remediates known and unknown vulnerabilities in firmware and software supply chains. Binarly's services are designed to provide visibility into firmware and software vulnerabilities, identify malicious code, and offer prescriptive fixes for rapid resolution. It was founded in 2021 and is based in Santa Monica, California.

P
Phylum

Phylum is a security-as-code platform that focuses on automating software supply chain security within the technology sector. The company offers services that analyze open-source software packages, detect and block zero-day attacks, and enforce compliance and governance policies. Phylum's solutions are designed to protect applications at the perimeter of the open-source ecosystem and the tools used to build source code. It was founded in 2020 and is based in Evergreen, Colorado.

Sysdig Logo
Sysdig

Sysdig focuses on protecting cloud environments, containers, and Kubernetes. The company provides services including cloud security, workload protection, vulnerability management, and security posture management. Sysdig serves sectors that require cloud-native application protection and security management. It was founded in 2013 and is based in San Francisco, California.

Loading...

CBI websites generally use certain cookies to enable better interactions with our sites and services. Use of these cookies, which may be stored on your device, permits us to improve and customize your experience. You can read more about your cookie choices at our privacy policy here. By continuing to use this site you are consenting to these choices.