- Service Overview
- Billing
- Getting Started
- User Guide
- Best Practices
-
FAQs
-
Binary Software Composition Analysis (SCA)
- What Objects Can Be Scanned?
- What Are the Precautions of Binary SCA?
- How Does Binary SCA Work and What Risks Can be Identified?
- How Do I Handle Open-Source Software Vulnerabilities?
- How Do I Handle Secure Complier Option Vulnerabilities?
- How Do I Handle Security Configuration Issues?
- How Do I Handle Information Leakage Risks?
- Why Is the Component Version Not Identified or Incorrectly Identified?
- Why Can't I Buy a CodeArts Governance Package?
- How Do I View the Path of a File that Has Vulnerabilities?
- What Can I Do If a Binary SCA Task Fails?
- How Do I Check User Group Permissions and Grant Permissions?
- What Should I Do If a Role Permission Error (Roles with READONLY_USER) Is Reported?
-
Binary Software Composition Analysis (SCA)
- General Reference
Show all
Copied.
Checking Binary SCA Job Details
This section describes how to check the scanning results.
Prerequisites
- You have obtained a username and its password to log in to the management console.
- A job has been completed.
Procedure
- Log in to the CodeArts Governance console.
- In the navigation pane on the left, choose Software Composition Analysis (SCA) > Binary SCA.
- Check all jobs.
- Click a job name to check its report. Alternatively, click View Report in the Operation column of the job. Table 1 lists items on the details page.
Table 1 Items on the details page
Item
Description
Job Info
- Basic Info: The file name, file size, feature library version, and platform version are shown.
- Here presents the results of all scan items in a general way.
- Component Analysis: the total number of components in the software package and the proportions of components with vulnerabilities, unknown versions, and no vulnerabilities
- Vulnerability Severity: the total number of vulnerabilities and the proportions of critical, high-risk, medium-risk, and low-risk vulnerabilities
- Security Configurations: the total number of check items and the proportions of passed, failed, and not-involved check items
- Open-Source Software Licenses: the statistics of licenses with high, medium, and low risks
- Key and Info Leakage: the total number of data leakage issues and their distribution
- Secure Complier Options: the total number of secure complier option issues and their distribution
Open-Source Software Vulnerabilities
The name, version, license, number of files, and number of vulnerabilities of each component in the scanning job
- You can filter the list by alphabetical order, component version, or the number of files.
- You can filter the component list by component name or open-source license.
Open-Source Software Licenses
The license risks of different severity, including the integration and compatibility risks.
- Licenses: The license check result of binary file packages. The license name, integration risk, components involved, license description, and risk analysis are displayed.
- Compatibility: The check result of license compatibility risks in each directory of the binary file package.
Key and Info Leakage
The check results of the Git addresses, IPs, hard-coded passwords, weak passwords, hard-coded keys, and SVN addresses.
Secure Complier Options
The description and result of BIND_NOW, NX, PIC check items, and number of files that do not meet the requirements.
Security Configurations
The check items, issue severity, and results related to credential management, authentication questions, and session management.
- On the Open-Source Software Vulnerabilities tab page, check the vulnerabilities of each component.
You can click a component name to check vulnerability details.
- Click
next to object patch to copy it.
Figure 1 Copying an object path - Click the CVE vulnerability name to check its details, introduction, fixing solution, reference, and reference link.
- Click
- On the Open-Source Software Licenses tab page, check the result of each license.
- On the Key and Info Leakage tab page, check the result of each check item.
- On the Secure Compiler Options tab page, check the result of each check item.
- On the Security Configurations tab page, check the results related to credential management, authentication questions, and session management.
Feedback
Was this page helpful?
Provide feedbackThank you very much for your feedback. We will continue working to improve the documentation.See the reply and handling status in My Cloud VOC.
For any further questions, feel free to contact us through the chatbot.
Chatbot