See where we are going together
We’re excited to share our priorities and upcoming features, designed to enhance security, simplify workflows, and empower you with greater efficiency and transparency.
Priority
Vulnerabilities view
Easily manage all vulnerabilities—both inherited and injected—through a unified tab. This consolidated view simplifies workflows, reduces confusion, and ensures an intuitive user experience, allowing you to focus on addressing risks rather than navigating disparate tools.
Inherited vulnerabilities treatment
Assess the risk for all inherited vulnerabilities to ensure comprehensive coverage of your Software Development Life Cycle (SDLC). This approach minimizes security gaps, preserves development integrity, and ensures that your projects are robust against potential threats.
Supply Chain
Support for package manager extensions
Seamlessly integrate with various package managers to enhance functionality and streamline workflows. This feature saves time and effort, enabling faster dependency management and a smoother development experience.
.NET
- .csproj SUPPORTED
- .exe.config COMING SOON
- packages.config SUPPORTED
C++
- conan.lock SUPPORTED
- conanfile.py COMING SOON
- conanfile.txt COMING SOON
Dart
- pubspec.yaml COMING SOON
Elixir
- mix.exs COMING SOON
- mix.lock SUPPORTED
Go
- go.mod COMING SOON
HTML
- .html (script tags) SUPPORTED
Java
- .gradle SUPPORTED
- build.gradle.kts SUPPORTED
- .xml (Maven pom.xml) SUPPORTED
- gradle-wrapper.properties COMING SOON
- build.sbt COMING SOON
JavaScript
- package-lock.json SUPPORTED
- package.json SUPPORTED
- pnpm-lock.yaml SUPPORTED
- yarn.lock SUPPORTED
PHP
- composer.json SUPPORTED
- composer.lock SUPPORTED
Python
- .txt (pip requirements) SUPPORTED
- Pipfile SUPPORTED
- Pipfile.lock SUPPORTED
- pyproject.toml SUPPORTED
Ruby
- Gemfile SUPPORTED
- Gemfile.lock SUPPORTED
- gems.locked SUPPORTED
Rust
- Cargo.lock SUPPORTED
- Cargo.toml SUPPORTED
Swift
- Package.resolved SUPPORTED
SBOM (software bill of materials)
- .json (SPDX/CycloneDX) COMING SOON
- .xml (SPDX/CycloneDX) COMING SOON
Report on malware dependencies
Generate detailed reports identifying malicious dependencies in your projects. Early detection empowers you to address these risks proactively, safeguarding system integrity and protecting your software from exploitation.
SBOM for Docker images
Automatically generate Software Bill of Materials (SBOMs) for registered Docker images, including their dependencies and operating system components. Full visibility into your Docker images promotes transparency, ensures traceability, and enhances your ability to manage security risks effectively.
Report on development dependencies
List all development dependencies, including those outside production code, to identify vulnerabilities (CVEs) and secure every aspect of your environment. This proactive approach ensures comprehensive risk management across all dependencies.
Differentiate between direct and transitive dependencies
Clearly distinguish between direct and transitive dependencies in the dependency tree. Enhanced visibility helps prioritize fixes, assess risks, and maintain a more secure and manageable dependency structure.
Streamline Resource Management
Environments URL
Move environments and associated resources between roots and groups with a single action. This flexibility helps adapt to changing operational needs, saving time and ensuring that resource organization aligns with team workflows.
To-Do
Default columns
Expand default views to include additional columns, offering comprehensive information upfront. Having critical details at a glance boosts productivity and enables faster, more informed decision-making.
Columns, filters and tables
Experience a cleaner, more intuitive interface with improved navigation and responsiveness. A redesigned platform reduces cognitive load, enhances accessibility, and keeps users focused on their tasks. Improved performance ensures a seamless experience, increasing satisfaction and overall productivity.
Audit and Compliance
Audit Logging
Enable detailed audit logging to capture and track user actions, changes to configurations, and system events. This feature supports compliance requirements, enhances accountability, and provides a clear record for investigating security incidents or operational issues.
Let’s Build the Future Together
These upcoming features are designed with you in mind, making your workflows simpler, your systems more secure, and your operations more efficient.
Stay connected for updates, and let us know how we can help you succeed.
Free trial