How Does Binary SCA Work and What Risks Can be Identified?
CodeArts Governance decompresses and scans your software packages and firmware. It performs component feature analysis based on the bill of materials (BOM) to identify possible rule violations. The following lists the vulnerabilities that can be identified.
- Open source software's known vulnerabilities and license compliance risks.
- Security configuration risks in hard-coded credentials, sensitive files (keys, certificate, and debugging tools), OS authentication, and access control.
- Disclosure risks of IP addresses, hard-coded keys, passwords, and Git/SVN repositories.
- Compiler security option risks in binary program compilation.
Figure 1 Risk items
Feedback
Was this page helpful?
Provide feedbackThank you very much for your feedback. We will continue working to improve the documentation.See the reply and handling status in My Cloud VOC.
For any further questions, feel free to contact us through the chatbot.
Chatbot