search
Join or Log In

Software Composition Analysis

Browse 30 cybersecurity tools tagged with "Software Composition Analysis"

DerSecur Software Composition Analysis (SCA)

DerSecur Software Composition

language

Risk Assessment

DerSecur Software Composition Analysis (SCA) on SecurityListing: SCA tool for SBOM generation, dependency analysis, and open-source risk mgmt.

4.8(3)
Flyingduck Software Composition Analysis

Flyingduck Software Composition

language

API Security

Flyingduck Software Composition Analysis on SecurityListing: SCA tool for identifying & resolving vulnerabilities in dependencies

4.7(2)
Anchore Enterprise

Anchore Enterprise

language

Container Security

Anchore Enterprise on SecurityListing: Anchore Enterprise is a platform that protects and secures software supply chains end-to-end.

4.7(2)
Invicti Software Composition Analysis

Invicti Software Composition

language

Vulnerability Assessment

Invicti Software Composition Analysis on SecurityListing: SCA tool with proof-based validation and runtime analysis for open-source risks

4.7(2)
Ossprey

Ossprey

language

Threat Intelligence Platforms

Ossprey on SecurityListing: Ossprey is a software supply chain security platform that uses AI-powered scanning to detect malicious open source code and prevent supply chain attacks through automated policy enforcement and dependency analysis.

4.5(3)
BoostSecurity Software Supply Chain Protection

BoostSecurity Software Supply

language

Software Composition Analysis

BoostSecurity Software Supply Chain Protection on SecurityListing: Software supply chain security platform for SDLC infrastructure protection

4.5(3)
Phylum

Phylum

language

Software Composition Analysis

Phylum on SecurityListing: Identifies 137 malicious npm packages and gathers system information to a remote server.

4.5(1)
FossID Software Composition Analysis

FossID Software Composition

language

Software Composition Analysis

FossID Software Composition Analysis on SecurityListing: SCA tool for code scanning, license identification, and SBOM generation

4.5(1)
Raven Runtime Prevention

Raven Runtime Prevention

language

Software Composition Analysis

Raven Runtime Prevention on SecurityListing: Runtime protection preventing supply-chain attacks & exploits via library-level policies

4.5(1)
Finite State Platform

Finite State Platform

language

Software Composition Analysis

Finite State Platform on SecurityListing: Platform for vulnerability detection in firmware, binaries, and SBOMs

4.5(1)
DeepSource SCA

DeepSource SCA

language

Software Composition Analysis

DeepSource SCA on SecurityListing: SCA platform with reachability analysis, AI-powered fixes, and license compliance

4.5(1)
Heeler Runtime, Fixability-First SCA

Heeler Runtime, Fixability-First

language

Threat Intelligence Platforms

Heeler Runtime, Fixability-First SCA on SecurityListing: Runtime SCA tool prioritizing fixable & exploitable open-source vulnerabilities

4.5(1)
MatosSphere Software Composition Analysis

MatosSphere Software Composition

language

Container Security

MatosSphere Software Composition Analysis on SecurityListing: SCA tool for detecting vulnerabilities & license risks in open-source deps

4.5(1)
Jsmon 2.0

Jsmon 2.0

language

API Security

Jsmon 2.0 on SecurityListing: JavaScript security scanner for detecting vulnerabilities in third-party scripts

4.5(1)
Endor Labs Application Security

Endor Labs Application

language

Software Composition Analysis

Endor Labs Application Security on SecurityListing: AI-powered AppSec platform for code, dependencies, and container security

4.3(2)
Koi Platform

Koi Platform

language

Risk Assessment

Koi Platform on SecurityListing: Tracks, governs, and secures software installs across endpoints and marketplaces.

3.9(3)
pac-resolver

pac-resolver

language

Software Composition Analysis

pac-resolver on SecurityListing: Pac-resolver, a popular NPM package with 3 million weekly downloads, has a severe remote code execution flaw.

3.8(1)
Raven Runtime SCA

Raven Runtime SCA

language

Software Composition Analysis

Raven Runtime SCA on SecurityListing: Runtime SCA tool that identifies exploitable vulnerabilities in cloud environments

Anchore Secure

Anchore Secure

language

Container Security

Anchore Secure on SecurityListing: Container & source code scanning for vulnerabilities, malware, and secrets

MergeBase Software Composition Analysis

MergeBase Software Composition

language

Software Composition Analysis

MergeBase Software Composition Analysis on SecurityListing: SCA platform for managing open source vulnerabilities across SDLC

Wiz Supply Chain Security

Wiz Supply Chain

language

Container Security

Wiz Supply Chain Security on SecurityListing: Cloud-native SCA and SBOM platform for supply chain security across code to runtime

Snyk Developer Security Platform

Snyk Developer Security

language

Cloud Security

Snyk is a developer security platform that enables teams to find and automatically fix vulnerabilities in open source dependencies, container images, infrastructure as code, and application code. Unlike traditional security tools that operate as gate-checks, Snyk integrates directly into developer workflows through IDE plugins, CI/CD integrations, and SCM systems, enabling security testing at every stage of development.

SCANOSS Licence Dataset

SCANOSS Licence Dataset

language

API Security

SCANOSS Licence Dataset on SecurityListing: Open source license compliance dataset for detecting code snippets & obligations

Sabotage: Code added to popular NPM package wiped files in Russia and Belarus

Sabotage: Code added

language

Software Composition Analysis

Sabotage: Code added to popular NPM package wiped files in Russia and Belarus on SecurityListing: A developer added malicious code to a popular open-source package, wiping files on computers in Russia and Belarus as a protest.

SCANOSS Security Dataset

SCANOSS Security Dataset

language

API Security

SCANOSS Security Dataset on SecurityListing: Vulnerability detection dataset for declared & undeclared dependencies in code

SCANOSS Encryption Dataset

SCANOSS Encryption Dataset

language

Risk Assessment

SCANOSS Encryption Dataset on SecurityListing: Identifies cryptographic algorithms and libraries in code for compliance

SCANOSS Geo Provenance Dataset

SCANOSS Geo Provenance

language

Risk Assessment

SCANOSS Geo Provenance Dataset on SecurityListing: Identifies geographic origin and authorship of open source code components

Raven Runtime Application Protection

Raven Runtime Application

language

Container Security

Raven Runtime Application Protection on SecurityListing: Runtime app protection with function-level reachability and exploit prevention

Flyingduck Comprehensive SBOM Management

Flyingduck Comprehensive SBOM

language

Software Composition Analysis

Flyingduck Comprehensive SBOM Management on SecurityListing: SBOM management platform for tracking dependencies and vulnerabilities

The Code Registry Application & Supply Chain Security

The Code Registry

language

Software Composition Analysis

The Code Registry Application & Supply Chain Security on SecurityListing: AI-driven app & supply chain security platform with SBOM generation & scanning