Analyze your supply chain security | Fluid Attacks Help

Analyze your supply chain security

Role requirement infoRole required: User, Vulnerability Manager or Group Manager
The Packages section within Inventory is designed to give you visibility into the dependencies used across all active repositories in a group, helping you monitor the status of these dependencies, regarding updates, security advisories and reachable vulnerabilities.

Know software dependencies list on the Fluid Attacks platform

Views of Packages

Packages

The Packages section shows you all the third-party dependencies used across the code repositories of your group. This is the information provided by the table:
  • Dependency: Name of the open-source component or dependency
  • Repository: The nickname your organization has given to the repository where the dependency is used
  • Version status: Indicates the version of the dependency currently in use by your project plus security-relevant status regarding the dependency version, where the following values are possible:
    • Reachable: A vulnerable element of the dependency is effectively called by your application, thus generating the risk of the vulnerability being exploited in the context of your application.
    • Vulnerable: Advisories have been issued for that dependency version.
    • Outdated: A newer version of the dependency is available, in which case the column shows the suggested upgrade.
    • Updated: The dependency is in its latest version.
    • Malware: Malicious software was detected in that dependency version.
  • Vulnerabilities: The number of detected vulnerabilities of each CVSS qualitative severity rating
  • License: The license of the software package, like ISC or MIT, which defines how your project can legally use its code
  • Last publish: Time since the latest version was released
  • Locations: The number of files within the repo that contain, or correspond to, the dependency
  • Idea
    Click on the link to enter the Package Imports section.

You can click on the columns button (Find columns button on the Fluid Attacks platformto open a window where you can reorder, show or hide columns.

Manage columns in packages on the Fluid Attacks platform

You can filter the dependencies by variables that are visible in the table as well as the following: the Docker images containing them, the package manager used, and the stage in which your project depends on the third-party dependencies.

Filter the Supply chain section on Fluid Attacks platform
Filter dependencies
Identify outdated dependencies on the Fluid Attacks platform
Apply filter by 'Version status'

Package Imports

In the Packages section, when you click on the links in the Locations column, you are taken to a table showing information of your files related to the selected third-party dependency.

See direct dependency in production on the Fluid Attacks platformUse of the direct dependency in the production stage
See transitive dependency in development and prod on the Fluid Attacks platformUse of the transitive dependency in development and production stages
The table columns provide the following information:
  1. Transitivity: Whether the listed vulnerable files in your software are directly or indirectly related to the third-party component in question:
    1. D: Short for 'Direct'; the file in your project explicitly imports and uses the third-party dependency
    2. T: Short for 'Transitive'; the third-party dependency is required by your direct dependencies, but not directly imported by the file in your project
    3. U: Short for 'Undeterminable'; for this file, it is impossible to determine whether the dependency is direct or transitive
  2. Locations: The file related to the third-party dependency
  3. Specific: The exact line of code that shows the relation with the third-party dependency stated in Transitivity
  4. Stage: The stage(s) in which your project depends on the third-party dependency:
    1. Build: Your file depends on the third-party component only in the software development stage
    2. Run: Your file depends on the third-party component in the live production environment
  5. Vulnerabilities associated: The number of vulnerabilities related to the third-party dependency
By clicking on the vulnerabilities associated link, you get a pop-up window, with the vulnerability details:

See dependency vulnerability on the Fluid Attacks platform
  1. Vulnerability: The file path where the vulnerability is found
  2. Specific: The exact line of code that shows the relation with the third-party dependency stated before in Transitivity
  3. Advisory ID: The identifier for the vulnerability advisory or Common Vulnerabilities and Exposures (CVE) entry
  4. Affected version: The dependency versions which are affected by the vulnerability
  5. Severity: The qualitative severity rating according to the Common Vulnerability Scoring System (CVSS)
  6. Reported: The link to the reported vulnerability on the platform
If you click on the downward-facing arrow, you can see a description taken from the advisory source and reference URLs.

View dependency advisory description on the Fluid Attacks platform

Supported package managers

Currently, supply chain analysis is supported for the following package managers:
  1. Alpine Package Keeper (apk)
  2. APK (Android Package)
  3. Bundler (Ruby)
  4. Cargo (Rust)
  5. CocoaPods (Swift)
  6. Composer (PHP)
  7. Dart Pub (Dart)
  8. dpkg (Debian)
  9. Gradle (Java)
  10. Hex (Elixir)
  11. Maven (Java)
  12. NPM (JavaScript)
  13. NuGet (.NET)
  14. Pacman (Arch Linux and derivatives)
  15. PECL (PHP)
  16. Pip (Python)
  17. Pipenv (Python)
  18. PNPM (JavaScript)
  19. Poetry (Python)
  20. RPM (Redhat)
  21. Swift Package Manager (Swift)
  22. YARN (JavaScript)

Supported Docker images

Currently, supply chain analysis is supported for the following Docker images:
  1. Alpine Linux
  2. Arch Linux
  3. Distros based on Debian (Ubuntu, Debian)
  4. Distros based on Red Hat or Fedora
Idea
Excited to start using the platform? Explore Meet the platform to learn where to start and where everything is.

Export SBOM

The inventory of open-source software in your project is available on the platform in two different formats: CycloneDX and SPDX. Each of these formats follow a standard to show dependencies, vulnerabilities and license information in an organized way.

You can easily export a software bill of materials (SBOM) for your dependencies following these steps:

  1. Within your group, navigate to Inventory > Packages.

  2. Click on the Export SBOM button.

    Find the SBOM generation button on the Fluid Attacks platform

  3. Select whether you want an SBOM for packages in your Git repository or Docker images.

    Select SBOM report type on the Fluid Attacks platform

  4. Select in which format you want to download the inventory of software dependencies: CycloneDX or SPDX.

    Choose SBOM format on the Fluid Attacks platform

  5. Select the file type for your SBOM: JSON or XML.

    Choose SBOM file type on the Fluid Attacks platform


  6. Select the resources (repos or Docker images) related to the project(s) of which you want to generate the SBOM. The window only shows active resources.

    Generate project SBOM on the Fluid Attacks platform


  7. Click on Generate.

  8. You then receive an email saying your SBOM is ready. Just go to the platform and click on Downloads to access the download option. If you chose more than one root, you receive a separate email for each root.
  9. Download SBOM by Fluid Attacks

Note on SBOM emailNote: The SBOM may take up to 5 minutes to be ready for download. Keep in mind that the information provided may vary depending on the standard. The file may include the package name, version, location, license and dependency tree, which shows the primary and transitive dependencies.
Free trial
Search for vulnerabilities in your apps for free with Fluid Attacks' automated security testing! Start your 21-day free trial and discover the benefits of the Continuous Hacking Essential plan. If you prefer the Advanced plan, which includes the expertise of Fluid Attacks' hacking team, fill out this contact form.