@@ -64,11 +64,10 @@ ScanCode.io home screen.
6464
6565.. image :: images/output-files-projects-list.png
6666
67- Understanding Output Files
68- --------------------------
69- As previously mentioned, the output file format is set using the ``–-format ``
70- option to either JSON or XLSX data files. Regardless of the format, the
71- data included in either output file remains almost the same.
67+ Supported formats
68+ -----------------
69+
70+ .. _output_files_json :
7271
7372JSON
7473^^^^
@@ -252,23 +251,85 @@ The results will also include all of the or files (codebase resources) found.
252251 "is_archive" : false
253252 }]
254253
254+ .. _output_files_xlsx :
255+
255256Excel (XLSX)
256257^^^^^^^^^^^^
257- ScanCode.io can produce the scan results in a .xlsx file format, which will
258- include two Excel sheets for the Discovered Packages and the Codebase Resources.
258+ ScanCode.io can generate scan results in **Excel (.xlsx) ** format. The exported file
259+ contains multiple sheets, categorized by data type. The following sheets are
260+ **always included **:
261+
262+ - **PACKAGES **: :ref: `data_models_discovered_package `
263+ - **DEPENDENCIES **: :ref: `data_models_discovered_dependency `
264+ - **RESOURCES **: :ref: `data_models_codebase_resource `
265+ - **RELATIONS **: :ref: `data_models_codebase_relation `
266+ - **MESSAGES **: :ref: `data_models_project_message `
267+
268+ Additional sheets are included **only when relevant ** (i.e., when data is available):
269+
270+ - **LAYERS **: Included when scanning **container images ** using the
271+ :ref: `pipeline_analyze_docker_image ` pipeline.
272+ - **TODOS **: Contains resources flagged as **"REQUIRES_REVIEW" **.
273+ - **VULNERABILITIES **: Lists vulnerabilities detected in project **packages ** and
274+ **dependencies **, typically when using the :ref: `pipeline_find_vulnerabilities `
275+ pipeline. This sheet is omitted if no vulnerabilities are found.
276+
277+ .. warning ::
278+ Unlike JSON exports, the **XLSX output ** does not include general scan metadata,
279+ such as tool version, execution date, or scan parameters.
280+
281+ Since it contains only a subset of the project data, it **cannot ** be used to
282+ recreate the project. For this purpose, prefer the :ref: `output_files_json ` output.
283+
284+ .. _output_files_spdx :
285+
286+ SPDX
287+ ^^^^
288+
289+ ScanCode.io can generate Software Bill of Materials (SBOM) in the **SPDX ** format,
290+ which is an open standard for communicating software component information.
291+ SPDX is widely used for license compliance, security analysis, and software supply
292+ chain transparency.
293+
294+ For more details, visit: https://spdx.dev/
295+
296+ The SPDX output includes:
297+
298+ - **Packages: ** Information about detected software packages, including name, version,
299+ licensing, and supplier details.
300+ - **Files: ** A list of scanned files with associated metadata, including licenses and
301+ copyright notices.
302+ - **Relationships: ** Dependencies and associations between packages and files.
303+ - **Licenses: ** License expressions for detected components.
259304
260305.. note ::
261- Unlike the JSON file, the XLSX output file does not include any general
262- information about the scan process, tool, date, etc.
306+ ScanCode.io produces SPDX documents in **SPDX JSON and Tag/Value formats **.
263307
264- The ** Discovered Packages ** data sheet includes details about all packages found :
308+ .. _ output_files_cyclonedx :
265309
266- .. image :: images/output-files-xlsx-packages.png
310+ CycloneDX
311+ ^^^^^^^^^
267312
268- while the **Codebase Resources ** sheet includes information about each
269- individual file:
313+ ScanCode.io can generate **CycloneDX ** SBOMs, a lightweight standard designed for
314+ security and dependency management. CycloneDX is optimized for vulnerability analysis
315+ and software supply chain risk assessment.
316+
317+ For more details, visit: https://cyclonedx.org/
318+
319+ The CycloneDX output includes:
320+
321+ - **Components: ** A list of identified software components, including their
322+ versions and licensing information.
323+ - **Dependencies: ** Relationships between software components, useful for analyzing
324+ supply chain risks.
325+ - **Vulnerabilities (when available): ** If vulnerability scanning is enabled,
326+ detected vulnerabilities will be included in the CycloneDX output.
327+ - **Metadata: ** Information about the scan, including tool details and execution data.
328+
329+ .. note ::
330+ ScanCode.io produces CycloneDX SBOMs in **JSON format **.
270331
271- .. image :: images/output-files-xlsx-resources.png
332+ .. _ output_files_attribution :
272333
273334Attribution
274335^^^^^^^^^^^
0 commit comments