Software composition analysis (SCA) is a security technique that automatically identifies third-party dependencies or libraries used by an application and evaluates their security. Therefore, the importance of SCA scans is mainly the following:
- Vulnerability detection: SCA tools cross-reference your software's components against extensive vulnerability databases, like the National Vulnerability Database (NVD), to uncover known security flaws. Paired with static application security testing, these vulnerability scanning techniques can identify reachable vulnerabilities, i.e., instances where the dependency's insecure function, method or element is effectively used by the software product under evaluation.
- Software bill of materials (SBOM) generation: SCA tools can automatically generate a comprehensive SBOM, providing a detailed, standardized, record of all components and their origins. This is crucial for supply chain risk management and compliance with software development best practices.
Fluid Attacks' SCA scans test whether the application complies with the following security requirements:
- 048. Components with minimal dependencies
- 262. Verify third-party components
Fluid Attacks' scanner uses authoritative sources to obtain CVEs from reported security advisories so that it can report their existence in the applications under assessment. A list of these sources is available on the Vulnerability signature update page. Our multi-source approach ensures that Fluid Attacks' AppSec tool is up to date with the latest vulnerability information, providing you with accurate and comprehensive security assessments.
More specifically, we update our database every four hours with the information recorded in the listed sources. We identify new CVEs and the affected packages, filter our customers' groups that contain those packages, and queue timely software composition analyses for those groups.