Jump to main content
HCL Logo Product Documentation
Customer Support Community
Customer Support HCLSoftware U Community Forums Customer Idea Portal
HCL AppScan on Cloud Help
  1. Home icon
  2. Welcome
  3. Software Composition Analysis

    Use Software Composition Analysis (SCA) to scan for security vulnerabilities in open source and third-party packages used by your code. SCA includes Intelligent Finding Analytics (IFA) and Intelligent Code Analytics (ICA).

  4. Scanning libraries and third-party code for security vulnerabilities

    To scan open source libraries and third-party code for security vulnerabilities, follow the steps in these topics.

Product logo

  • Getting started

    Welcome to the documentation for HCL AppScan on Cloud, where you can find information about how to install, maintain, and use this service.

  • Navigation

    This section describes the items on the main AppScan on Cloud menu bar, with links to more detailed information.

  • Administration

    Define users, applications, policies, and configure DevOps integrations.

  • Dynamic analysis

    AppScan on Cloud performs security scans for web-applications for production, staging and development environments. For development environments it is aided by Private Site Scanning technology to scan applications not accessible to the open Internet.

  • Interactive monitoring

    Using an agent installed on your application, ASoC identifies security vulnerabilities in your application during runtime by monitoring all interactions, both legitimate and malicious. The process is "passive," in the sense that IAST does not send its own tests, and can therefore run indefinitely.

  • Software Composition Analysis

    Use Software Composition Analysis (SCA) to scan for security vulnerabilities in open source and third-party packages used by your code. SCA includes Intelligent Finding Analytics (IFA) and Intelligent Code Analytics (ICA).

    • About Software Composition Analysis

      Software Composition Analysis (SCA) identifies and examines open-source packages within your codebase to detect potential security vulnerabilities. SCA can analyze both individual source code files and package manager artifacts, such as configuration files, and lockfiles, to determine the open-source packages your project depends on.

    • System requirements for SCA

      The types of files that can be scanned by ASoC when you perform open source testing.

    • Scanning libraries and third-party code for security vulnerabilities

      To scan open source libraries and third-party code for security vulnerabilities, follow the steps in these topics.

      • Configure an open source scan in AppScan on Cloud

      • Configuring a scan using AppScan Go!

        AppScan Go! steps you through configuring and running a static scan. Run the scan in the cloud or use a plugin to automate scanning.

      • Generating an IRX file using the command-line interface (CLI)

        To initiate an analysis of your files, you must generate an IRX file to submit for scanning. To use the CLI to generate the IRX file, follow these instructions.

      • Generating in IRX file using a plugin or IDE
      • Runtime Software Composition Analysis

        Identify and manage vulnerabilities in open source components and libraries used by an application at runtime.

    • SCA scan results

      Features available in SCA scan results.

  • Static analysis

    Use static analysis (SAST) to scan for security vulnerabilities in web and desktop applications. Static analysis includes Intelligent Finding Analytics (IFA) and Intelligent Code Analytics (ICA).

  • Results

    The Scans and Sessions page lists the scans under the categories DAST, SAST, SCA, and IAST, where you can view your scan results, including scan statistics. To view, rescan, or download reports, select a scan.The Scans and Sessions page lists scans under the categories where you can view your scan results, including scan statistics. To view, rescan, or download reports, select a scan.

  • Troubleshooting

    If you experience problems with this service, you can perform these troubleshooting tasks to determine the corrective action to take.

  • FAQ & Reference

    Frequently asked questions, information about integrating ASoC into the product lifecycle (SDLC), and ASoC API documentation.

 Feedback

Scanning open source libraries and third-party code for security vulnerabilities

To scan open source libraries and third-party code for security vulnerabilities, follow the steps in these topics.

  • Configure an open source scan in AppScan on Cloud
  • Configuring a scan using AppScan Go!
  • Generating an IRX file using the command line interface (CLI)
  • Generating an IRX file using a plugin or IDE
  • Generating an IRX file using a Software Bill of Materials (SBOM) report
  • Share: Email
  • Twitter
  • Disclaimer
  • Privacy
  • Terms of use
  • Cookie Preferences