Help Center/ CodeArts Governance/ FAQs/ Binary Software Composition Analysis (SCA)/ How Does Binary SCA Work and What Risks Can be Identified?
Updated on 2025-06-05 GMT+08:00

How Does Binary SCA Work and What Risks Can be Identified?

CodeArts Governance decompresses and scans your software packages and firmware. It performs component feature analysis based on the bill of materials (BOM) to identify possible rule violations. The following lists the vulnerabilities that can be identified.

  • Open source software's known vulnerabilities and license compliance risks.
  • Security configuration risks in hard-coded credentials, sensitive files (keys, certificate, and debugging tools), OS authentication, and access control.
  • Disclosure risks of IP addresses, hard-coded keys, passwords, and Git/SVN repositories.
  • Compiler security option risks in binary program compilation.
    Figure 1 Risk items