You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Scans your project dependencies for security issues and shows you which dependencies are vulnerable. If the vulnerabilities have a fix, you can upgrade to the version with the fix in a click of a button.
18
16
19
-
</details>
20
-
21
-
<details>
22
-
23
-
<summary>CVE Research and Enrichment</summary>
17
+
**CVE Research and Enrichment**
24
18
25
-
For selected security issues, get leverage-enhanced CVE data that is provided by our JFrog Security Research team. Prioritize the CVEs based on:
19
+
or selected security issues, get leverage-enhanced CVE data that is provided by our JFrog Security Research team. Prioritize the CVEs based on:
26
20
27
21
***JFrog Severity**: The severity given by the JFrog Security Research team after the manual analysis of the CVE by the team. CVEs with the highest JFrog security severity are the most likely to be used by real-world attackers. This means that you should put effort into fixing them as soon as possible.
28
22
***Research Summary**: The summary that is based on JFrog's security analysis of the security issue provides detailed technical information on the specific conditions for the CVE to be applicable.
@@ -32,36 +26,22 @@ You can learn more about enriched CVEs [here](https://jfrog.com/help/r/jfrog-sec
32
26
33
27
Check out what our research team is up to and stay updated on newly discovered issues by clicking on this link: [https://research.jfrog.com](https://research.jfrog.com)
34
28
35
-
</details>
36
-
37
29
**Advanced**
38
30
39
31
_Requires Xray version 3.66.5 or above and Enterprise X / Enterprise+ subscription with_[_Advanced DevSecOps_](https://jfrog.com/xray/#xray-advanced)_._ 
40
32
41
-
<details>
42
-
43
-
<summary>CVEs Contextual Analysis</summary>
33
+
**CVEs Contextual Analysis**
44
34
45
35
Uses the code context to eliminate false positive reports on vulnerable dependencies that are not applicable to the code. CVEs Contextual Analysis is currently supported for Python, Java and JavaScript code.
46
36
47
-
</details>
48
-
49
-
<details>
50
-
51
-
<summary>Secrets Detection</summary>
37
+
**Secrets Detection**
52
38
53
39
Prevents the exposure of keys or credentials that are stored in your source code.
54
40
55
-
</details>
56
-
57
-
<details>
58
-
59
-
<summary>Infrastructure as Code (IaC) Scan</summary>
41
+
**Infrastructure as Code (IaC) Scan**
60
42
61
43
Secures your IaC files. Critical to keeping your cloud deployment safe and secure.
0 commit comments