Skip to content

Commit ce69055

Browse files
Talia Rosingitbook-bot
authored andcommitted
GITBOOK-184: change request with no subject merged in GitBook
1 parent 6e64790 commit ce69055

File tree

1 file changed

+6
-26
lines changed
  • jfrog-applications/ide/jetbrains-ides

1 file changed

+6
-26
lines changed

jfrog-applications/ide/jetbrains-ides/README.md

Lines changed: 6 additions & 26 deletions
Original file line numberDiff line numberDiff line change
@@ -10,19 +10,13 @@ The plugin allows developers to find and fix security vulnerabilities in their p
1010

1111
**Basic**
1212

13-
<details>
14-
15-
<summary>Software Composition Analysis (SCA)</summary>
13+
**Software Composition Analysis (SCA)**
1614

1715
Scans your project dependencies for security issues and shows you which dependencies are vulnerable. If the vulnerabilities have a fix, you can upgrade to the version with the fix in a click of a button.
1816

19-
</details>
20-
21-
<details>
22-
23-
<summary>CVE Research and Enrichment</summary>
17+
**CVE Research and Enrichment**
2418

25-
For selected security issues, get leverage-enhanced CVE data that is provided by our JFrog Security Research team. Prioritize the CVEs based on:
19+
or selected security issues, get leverage-enhanced CVE data that is provided by our JFrog Security Research team. Prioritize the CVEs based on:
2620

2721
* **JFrog Severity**: The severity given by the JFrog Security Research team after the manual analysis of the CVE by the team. CVEs with the highest JFrog security severity are the most likely to be used by real-world attackers. This means that you should put effort into fixing them as soon as possible.
2822
* **Research Summary**: The summary that is based on JFrog's security analysis of the security issue provides detailed technical information on the specific conditions for the CVE to be applicable.
@@ -32,36 +26,22 @@ You can learn more about enriched CVEs [here](https://jfrog.com/help/r/jfrog-sec
3226

3327
Check out what our research team is up to and stay updated on newly discovered issues by clicking on this link: [https://research.jfrog.com](https://research.jfrog.com)
3428

35-
</details>
36-
3729
**Advanced**
3830

3931
_Requires Xray version 3.66.5 or above and Enterprise X / Enterprise+ subscription with_ [_Advanced DevSecOps_](https://jfrog.com/xray/#xray-advanced)_._&#x20;
4032

41-
<details>
42-
43-
<summary>CVEs Contextual Analysis</summary>
33+
**CVEs Contextual Analysis**
4434

4535
Uses the code context to eliminate false positive reports on vulnerable dependencies that are not applicable to the code. CVEs Contextual Analysis is currently supported for Python, Java and JavaScript code.
4636

47-
</details>
48-
49-
<details>
50-
51-
<summary>Secrets Detection</summary>
37+
**Secrets Detection**
5238

5339
Prevents the exposure of keys or credentials that are stored in your source code.
5440

55-
</details>
56-
57-
<details>
58-
59-
<summary>Infrastructure as Code (IaC) Scan</summary>
41+
**Infrastructure as Code (IaC) Scan**
6042

6143
Secures your IaC files. Critical to keeping your cloud deployment safe and secure.
6244

63-
</details>
64-
6545
**Additional Perks**
6646

6747
* Security issues are easily visible inline.

0 commit comments

Comments
 (0)