Software composition analysis (SCA) is a security technique that automatically identifies third-party dependencies or libraries used by an application and evaluates their security. Therefore, the importance of SCA scans is mainly the following:
- Vulnerability detection: SCA tools cross-reference your software's components against extensive vulnerability databases, like the National Vulnerability Database (NVD), to uncover known security flaws. Paired with static application security testing, these vulnerability scanning techniques can identify reachable vulnerabilities, i.e., instances where the dependency's insecure function, method or element is effectively used by the software product under evaluation.
- Software bill of materials (SBOM) generation: SCA tools can automatically generate a comprehensive SBOM, providing a detailed, standardized, record of all components and their origins. This is crucial for supply chain risk management and compliance with software development best practices.
Fluid Attacks' SCA scans test whether the application complies with the following security requirements:
- 048. Components with minimal dependencies
- 262. Verify third-party components
Fluid Attacks' scanner uses the following authoritative sources to obtain the CVEs in reported security advisories and thus be able to report their existence in the applications under assessment: