Software Composition Analysis

Software Composition Analysis (SCA) tools for identifying security vulnerabilities in open source components, third-party libraries, and software dependencies.

Explore 45 curated cybersecurity tools, with 14,630+ visitors searching for solutions

FEATURED

Proton Pass Logo

Password manager with end-to-end encryption and identity protection features

NordVPN Logo

VPN service providing encrypted internet connections and privacy protection

Mandos Fractional CISO Services Logo

Fractional CISO services for B2B companies to accelerate sales and compliance

Get Featured

Feature your product and reach thousands of professionals.

Ossprey Logo

Ossprey is a software supply chain security platform that uses AI-powered scanning to detect malicious open source code and prevent supply chain attacks through automated policy enforcement and dependency analysis.

-1
Finite State Platform Logo

A device security analysis platform that provides comprehensive vulnerability scanning, SBOM management, and supply chain security monitoring for connected devices and their components.

0
Mend Logo

An application security platform that combines SCA, SAST, container security, dependency management, and AI model risk analysis with integrated workflows for development and security teams.

0
JFrog Software Supply Chain Platform Logo

An integrated software supply chain platform that combines repository management, security scanning, and DevSecOps capabilities for managing and securing the entire software development lifecycle.

0
ReversingLabs Spectra Assure Logo

A software supply chain security platform that analyzes binaries and software components to detect malware, vulnerabilities, exposed secrets, and tampering throughout the development lifecycle.

1
Checkmarx SCA Logo

A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.

1
Black Duck Logo

Black Duck is an application security platform that provides software composition analysis and supply chain security capabilities to identify vulnerabilities, ensure license compliance, and manage SBOMs throughout the software development lifecycle.

0
Anchore Enterprise Logo

Anchore Enterprise is a platform that protects and secures software supply chains end-to-end.

0
Syft Logo

A CLI tool and Go library for generating a Software Bill of Materials (SBOM) from container images and filesystems.

0
Retire.js Logo

JavaScript library scanner and SBOM generator

0
AuditJS Logo

AuditJS is a command-line tool that scans JavaScript projects for known vulnerabilities and outdated packages in npm dependencies using the OSS Index API or Nexus IQ Server.

0
npm-scan Logo

An extensible, heuristic-based vulnerability scanning tool for installed npm packages.

0
Audit Node Modules With YARA Rules Logo

A tool to run YARA rules against node_module folders to identify suspicious scripts

0
Spectra Logo

Comprehensive suite for advanced file analysis and software supply chain security.

0
Preflight Logo

Preflight is a Go-based verification tool that helps organizations validate scripts and executables to prevent supply chain attacks by enabling secure self-compilation and trusted distribution methods.

0
The Update Framework (TUF) Logo

A cryptographic framework that secures software update systems by enabling publishers to sign content offline and consumers to verify authenticity through trusted verification mechanisms.

0
NodeSecure Logo

NodeSecure is a cybersecurity project that provides security monitoring and analysis capabilities specifically designed for Node.js applications.

0
snync Logo

A security tool that detects potential Dependency Confusion attack vectors by identifying private package names that are not reserved on public registries.

0
Fix Lockfile Integrity Logo

Reverts sha1 integrity back to sha512 in lock files for enhanced security.

0
Sabotage: Code added to popular NPM package wiped files in Russia and Belarus Logo

A developer added malicious code to a popular open-source package, wiping files on computers in Russia and Belarus as a protest.

0
pac-resolver Logo

Pac-resolver, a popular NPM package with 3 million weekly downloads, has a severe remote code execution flaw.

0
bundler-audit Logo

Patch-level verification tool for bundler to check for vulnerable gems and insecure sources.

0
LavaMoat Logo

A set of tools for securing JavaScript projects against software supply chain attacks.

0
Dependency Combobulator Logo

An open-source framework that detects and prevents dependency confusion attacks across multiple package management systems and development environments.

0