OSS Review Toolkit

OSS Review Toolkit(ORT)은 소프트웨어 구성 분석(SCA), 라이선스 준수, 취약점 관리 등을 지원하는 모듈형 오픈소스 도구 모음입니다. Analyzer, Downloader, Scanner, Advisor, Evaluator, Reporter 등 6가지 도구로 구성되어 있으며, 다양한 패키지 매니저와 취약점 데이터 제공자를 통합해 소프트웨어 공급망 리스크를 체계적으로 관리할 수 있습니다. 각 도구는 독립적으로 또는 연동하여 사용 가능하며, SPDX, CycloneDX 등 표준 SBOM 생성도 지원해 AI 개발 환경에서 라이선스 및 보안 컴플라이언스 자동화에 유용합니다.

http://oss-review-toolkit.org/ort/

#softwarecompositionanalysis #licensecompliance #vulnerabilitymanagement #sbom #opensource

OSS Review Toolkit

A suite of CLI tools to automate software compliance checks.

When using open source software, YOU become the security supplier.

Discover how SCA scanning helps manage this responsibility and protect your applications from vulnerabilities like Log4j and XZ Utils: https://anchore.com/software-supply-chain-security/software-composition-analysis/

#SoftwareCompositionAnalysis #SCA #OpenSource

With up to 90% of applications built on open source code, SCA tools are no longer optional—they're essential.

Learn how Software Composition Analysis protects your organization from supply chain vulnerabilities: https://anchore.com/software-supply-chain-security/software-composition-analysis/

#SoftwareCompositionAnalysis #SCA

Everything You Need to Know About Software Composition Analysis (SCA)

Learn the ins and outs of software composition analysis along with expert tips for implementation from the cybersecurity experts at Anchore.

Anchore
DEF CON 32 - Your CI CD Pipeline Is Vulnerable, But It's Not Your Fault - Elad Pticha, Oreen Livni

YouTube
Manifest Confusion in PyPI

How some Python tools interpret dependencies differently.

stiankri's blog

⚠️ Beware of "alert fatigue" in your security processes!

Learn why integrating #SoftwareCompositionAnalysis in your CI/CD pipeline is crucial for safeguarding your software from vulnerabilities: https://bit.ly/3LnT6Ci

#InfoQ article by Lukáš Křečan

#Java #SCA #CI #CD #SecurityVulnerabilities

Dealing with Java CVEs: Discovery, Detection, Analysis, and Resolution

This article discusses the role of SCA in CI/CD pipelines, emphasizing human oversight for accurate vulnerability assessment and the importance of specialized security tools.

InfoQ
Log4Shell, a critical vulnerability discovered in December 2021 and officially tracked as CVE-2021-44228, has had a long-lasting impact, prompting enterprises to adopt software composition analysis and secure supply chain management practices. Despite receiving patches and widespread attention, it remains a common cause for security breaches a year later. https://www.csoonline.com/article/3684108/log4shell-remains-a-big-threat-and-a-common-cause-for-security-breaches.html#tk.rss_all #Log4Shell #CVE2021-44228 #SoftwareCompositionAnalysis #SecureSupplyChainManagement
Log4Shell remains a big threat and a common cause for security breaches

Log4Shell is likely to remain a favored vulnerability to exploit as organizations lack visibility into their software supply chains.

CSO Online
Invisible npm malware - evading security checks with crafted versions | JFrog

The npm CLI has a very convenient and well-known security feature – when installing an npm package, the CLI checks the package and all of its dependencies for well-known vulnerabilities – The check is triggered on package installation (when running npm install) but can also be triggered manually by running npm audit. This is an …

JFrog