In November 2025, the vibrant city of Berlin played host to the JFrog SwampUP conference, where the Docker team made a significant presence. Over the course of three days from November 12th to 14th, Docker’s team actively engaged in numerous technical sessions, facilitated a fireside chat, and held meaningful discussions with conference participants. Their presence at the event highlighted their commitment to understanding and advancing the field of software supply chain security. Gratitude was expressed to JFrog for orchestrating such an exceptional event.
Key Insights on Software Supply Chain Security Trends
The conference offered a wealth of insights, particularly in the domain of software supply chain security. One of the most pressing issues discussed was the alarming scale of software supply chain attacks, which have been reaching unprecedented levels due to the exploitation of open source packages. JFrog’s Chief Technology Officer, Asaf Karas, provided an in-depth analysis of recent attacks. He highlighted how cybercriminals are increasingly leveraging artificial intelligence (AI) and software supply chains to orchestrate their malicious exploits. These attacks often combine traditional techniques, such as phishing, with advanced AI prompts that autonomously generate and execute code. This approach has led to the compromise of hundreds of thousands of systems utilizing popular open source packages. Notable examples of such attacks include Shai Hulud, Red Donkey, and a recent phishing attack targeting NPM packages. While the scale of these attacks is concerning, the damage has been somewhat mitigated by the rudimentary nature of the exploits. However, as we look ahead, we anticipate an increase in both the frequency and sophistication of software supply chain attacks.
The Evolving Role of Governance in Security
Governance emerged as a critical layer of security in preventing software supply chain attacks. The conference discussions underscored the importance of preventing malicious code from entering the software supply chain in the first place. Governance plays a pivotal role here, as it involves controlling access points during the software development lifecycle. This includes steps such as dependency scanning, build pipelines, and deployments. However, it is not sufficient to merely control these stages; it is essential to block risky or malicious code before it can infiltrate the software supply chain. Additionally, tools must enhance their interoperability to detect all potential attack vectors effectively.
Tackling Challenges in AI Development with MCP
Multi-Cloud Platform (MCP) technology was another focal point at the conference. MCP’s ability to leverage both deterministic and non-deterministic outcomes by connecting a large language model (LLM) client to various servers is a significant reason why companies are investing in this technology. Each server operates independently, allowing for the implementation of governance layers on MCP servers. This reduces the risk of hallucinations or unexpected results. This assessment aligns with JFrog’s perspective, and there is excitement about potential collaborations between Docker and JFrog to enhance enterprise AI development experiences.
The Importance of Strong Open Source Foundations in the AI Era
A highlight of the event was a fireside chat featuring Gal Marder, JFrog’s Chief Strategy Officer, and Michael Donovan, Docker’s Vice President of Product. They delved into the risks associated with unverified open source dependencies and discussed strategies for mitigating these risks. The conversation emphasized the necessity of building on strong foundations by utilizing hardened images and maintaining them throughout their lifecycle, even those that have reached the end of their life. Ensuring visibility and governance at every stage is crucial. Furthermore, robust third-party integrations are vital for managing complexity effectively and extending security and trust from development to delivery.
Conclusion: Building Strong Foundations and Staying Ahead
The fast-paced evolution of software development, driven by AI integration, poses both opportunities and challenges for developers and attackers alike. To stay ahead, it is imperative to build robust protective measures early on, starting with strong foundations and maintaining consistency across every stage. Governance, visibility, and strong partnerships are essential components of this strategy. By adhering to these principles, teams can innovate with confidence and speed as the technological landscape continues to evolve.
Additional Resources and Information
For those interested in delving deeper into the topics discussed at the conference, a range of resources is available:
- Subscribe to the Docker Navigator Newsletter for the latest updates and insights.
- Explore the MCP Catalog to discover containerized, security-hardened MCP servers.
- Check out the DHI Catalog to find secure, minimal, and production-ready container images.
- Learn about Docker Partner Programs to discover trusted partners, tools, and integrations.
- If you are new to Docker, create an account to get started on your journey.
- For any questions, the Docker community is readily available to provide assistance.
These resources offer valuable information and support for anyone looking to enhance their understanding of software supply chain security and related technologies. As the industry continues to evolve, staying informed and connected with the community will be key to navigating the challenges and opportunities that lie ahead.
For more Information, Refer to this article.

































