See where we are going together
We’re excited to share our priorities and upcoming features, designed to enhance security, simplify workflows, and empower you with greater efficiency and transparency.
Priority
Vulnerabilities view
Manage all vulnerabilities—both inherited and injected—through a unified tab, simplifying workflows and reducing the need to switch between multiple tools.
Inherited vulnerabilities treatment
Evaluate the risk of all inherited vulnerabilities to ensure thorough coverage and reduce security gaps in the Software Development Life Cycle (SDLC).
Supply chain
Support for package manager extensions
Integrate with various package managers to simplify dependency management and streamline workflows.
.NET
- .csproj SUPPORTED
- .exe.config COMING SOON
- packages.config SUPPORTED
C++
- conan.lock SUPPORTED
- conanfile.py COMING SOON
- conanfile.txt COMING SOON
Dart
- pubspec.yaml COMING SOON
Elixir
- mix.exs COMING SOON
- mix.lock SUPPORTED
Go
- go.mod COMING SOON
HTML
- .html (script tags) SUPPORTED
Java
- .gradle SUPPORTED
- build.gradle.kts SUPPORTED
- .xml (Maven pom.xml) SUPPORTED
- gradle-wrapper.properties COMING SOON
- build.sbt COMING SOON
JavaScript
- package-lock.json SUPPORTED
- package.json SUPPORTED
- pnpm-lock.yaml SUPPORTED
- yarn.lock SUPPORTED
PHP
- composer.json SUPPORTED
- composer.lock SUPPORTED
Python
- .txt (pip requirements) SUPPORTED
- Pipfile SUPPORTED
- Pipfile.lock SUPPORTED
- pyproject.toml SUPPORTED
Ruby
- Gemfile SUPPORTED
- Gemfile.lock SUPPORTED
- gems.locked SUPPORTED
Rust
- Cargo.lock SUPPORTED
- Cargo.toml SUPPORTED
Swift
- Package.resolved SUPPORTED
SBOM (software bill of materials)
- .json (SPDX/CycloneDX) COMING SOON
- .xml (SPDX/CycloneDX) COMING SOON
Report on malware dependencies
Generate reports that identify malicious dependencies used in the project for timely risk mitigation.
SBOM for Docker images
Generate a Software Bill of Materials (SBOM) for Docker images, detailing dependencies and operating system components to improve visibility and traceability.
Report on development dependencies
List all development dependencies, including those outside of production code, to identify potential vulnerabilities (CVEs) and secure the environment.
Differentiate between direct and transitive dependencies
Distinguish between direct and transitive dependencies in the dependency tree to improve visibility and prioritize security fixes.
Scope management
Environments URL
Relocate environments and associated resources between roots and groups with a single action to support evolving operational needs.
To-do
Default columns
Expand default views to include additional columns, providing a more comprehensive overview in the interface.
Columns, filters and tables
Provide the interface with improved navigation, responsiveness, and performance to enhance usability and reduce complexity.
Audit and compliance
Audit logging
Implement detailed logging of user actions, configuration changes, and system events to support compliance and incident investigation.
Free trial