This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org

Difference between revisions of "Component Analysis"

From OWASP
Jump to: navigation, search
m (Added Renovate to tool listing)
(Added component inventory and clarifications to existing risks. Removed from draft)
Line 1: Line 1:
<big>DRAFT</big>
 
 
 
Component Analysis is the process of identifying potential areas of risk from the use of third-party and open-source software and hardware components. Component Analysis is a function within an overall [https://csrc.nist.gov/projects/supply-chain-risk-management Cyber Supply Chain Risk Management] (C-SCRM) framework. A software-only subset of Component Analysis with limited scope is commonly referred to as Software Composition Analysis (SCA).
 
Component Analysis is the process of identifying potential areas of risk from the use of third-party and open-source software and hardware components. Component Analysis is a function within an overall [https://csrc.nist.gov/projects/supply-chain-risk-management Cyber Supply Chain Risk Management] (C-SCRM) framework. A software-only subset of Component Analysis with limited scope is commonly referred to as Software Composition Analysis (SCA).
  
Line 6: Line 4:
  
 
== Common Risk Factors ==  
 
== Common Risk Factors ==  
 +
 +
===== Component Inventory =====
 +
Having an accurate inventory of all third-party and open source components is pivotal for risk identification. Without such knowledge, other factors of Component Analysis become impractical to determine with high confidence. Use of dependency management solutions and/or [[#Software Bill-of-Materials (SBOM)|Software Bill-of-Materials (SBOM)]] can aid in inventory creation.
  
 
===== Component Age =====
 
===== Component Age =====
Components may have varying degrees of age acceptance criteria. Factors that impact acceptable age include the type of component, the ecosystem the component is a part of (Maven, NPM, etc), and the purpose of the component. The age of a component may signify use of outdated technology and may have a higher probability of being passed over by security researchers.
+
Components may have varying degrees of age acceptance criteria. Factors that impact acceptable age include the [[#Component Type|type of component]], the ecosystem the component is a part of (Maven, NPM, etc), and the purpose of the component. The age of a component may signify use of outdated technology and may have a higher probability of being passed over by security researchers.
  
 
===== Outdated Components =====
 
===== Outdated Components =====
Newer versions of components typically improve quality or performance in addition to providing new features. These improvements can be inherited by the applications that have a dependency on them. Components that are End-of-Life (EOL) or End-of-Support (EOS) also impact risk. Two common approaches to community supported open-source is:
+
Newer versions of components typically improve quality or performance in addition to providing new features. These improvements can be inherited by the applications that have a dependency on them. Components that are end-of-life (EOL) or end-of-support (EOS) also impact risk. Two common approaches to community supported open-source is:
  
 
* Support the latest revision of the last (x) releases - (i.e. 4.3.6 and 4.2.9)
 
* Support the latest revision of the last (x) releases - (i.e. 4.3.6 and 4.2.9)
Line 18: Line 19:
 
Depending on the risk appetite, it may be strategic to only use third-party and open source components that are supported.
 
Depending on the risk appetite, it may be strategic to only use third-party and open source components that are supported.
  
With reference to the [https://semver.org/ Semantic Versioning] nomenclature, API changes can be expected between major versions of a component, but are rare between minor versions and patches. Changes in APIs can negatively impact an organizations ability to respond to emerging vulnerabilities. When a vulnerability is published affecting a wide range of versions but the fix is immediately available only in newer versions, changes in a components API may result in longer remediation times. Keeping components up-to-date can reduce remediation time when a rapid response is warranted.
+
With reference to [https://semver.org/ Semantic Versioning] terminology, API changes can be expected between major versions of a component, but are rare between minor versions and patches. Changes in a components API may result in longer remediation times if the components have not been continuously updated. Keeping components up-to-date can reduce remediation time when a rapid response is warranted.
  
 
Component analysis can identify outdated components as well as provide information about newer versions.
 
Component analysis can identify outdated components as well as provide information about newer versions.
Line 33: Line 34:
  
 
===== Component Type =====
 
===== Component Type =====
Frameworks and libraries have unique upgrade challenges and associated risk. Abstractions, coupling, and architectural design patterns may affect the risk of using a given component type. For example, logging libraries may be embedded throughout a large application, but replacing implementations can likely be automated. Likewise, replacing a web application framework for an alternative framework would likely be a high-risk endeavor leading to architectural changes, regressions, and code rewrites. Evaluating the type should be part of every Component Analysis strategy.
+
Frameworks and libraries have unique upgrade challenges and associated risk. Abstractions, coupling, and architectural design patterns may affect the risk of using a given component type. For example, logging libraries may be embedded throughout a large application, but replacing implementations can likely be automated. Likewise, replacing a web application framework for an alternative framework would likely be a high-risk endeavor leading to architectural changes, regressions, and code rewrites. Component type may also be used to determine if duplicate or similar functionally exists. For example, it's unlikely an application would need multiple XML parsers or cryptographic libraries. Risk can be reduced by minimizing the number of components for a given type. Evaluating the type should be part of every Component Analysis strategy.
  
 
===== Component Quantity =====
 
===== Component Quantity =====
Line 49: Line 50:
  
 
===== Pedigree =====
 
===== Pedigree =====
A component's pedigree refers to the traceability of all changes (i.e. commits), releases, modifications, packaging, and distribution across the entire supply chain. In physical supply chains this is referred to as the Chain of Custody. Obtaining a components pedigree may involve a mixture of automation across multiple systems and suppliers, along with legal and verifiable supporting documentation.
+
A component's pedigree (sometimes referred to as 'provenance') refers to the traceability of all changes (i.e. commits), releases, modifications, packaging, and distribution across the entire supply chain. In physical supply chains this is referred to as the Chain of Custody. Obtaining a components pedigree may involve a mixture of automation across multiple systems and suppliers, along with legal and verifiable supporting documentation. Component pedigree includes all supporting documentation of lineage and the attributes which make a component unique.
 
 
Verification and validation of component pedigree is typically reserved for applications with a low tolerance for risk.
 
  
 
===== License =====
 
===== License =====
Line 65: Line 64:
 
* Vulnerability Analysis - Analyzing current and historical security vulnerabilities for timeline trends and for root-cause patterns may signify a projects ability to protect the community from future (and similar) issues. This activity may be a factor in risk evaluation.  
 
* Vulnerability Analysis - Analyzing current and historical security vulnerabilities for timeline trends and for root-cause patterns may signify a projects ability to protect the community from future (and similar) issues. This activity may be a factor in risk evaluation.  
  
== Software Transparency ==
+
== Software Bill-of-Materials (SBOM) ==
Multiple efforts between government and industry are attempting to define ''Software Transparency''. Some of these efforts will lead to increased compliance or regulatory requirements. Software Transparency is often achieved through the publishing of bill-of-materials (BOM). A BOM is synonymous to the list of ingredients on food packaging. Both are an implementation of transparency, designed to provide consumers with information they can use to evaluate risk prior to consumption. A BOM has the added advantage of being useful for component analysis throughout the entire lifecycle of the products use.
+
Multiple efforts between government and industry are attempting to define ''Software Transparency''. Some of these efforts will lead to increased compliance or regulatory requirements. Software Transparency is often achieved through the publishing of bill-of-materials (BOM). A BOM is synonymous to the list of ingredients on food packaging. Both are an implementation of transparency designed to provide consumers with information they can use to evaluate risk prior to consumption. A BOM has the added advantage of being useful for component analysis throughout the entire lifecycle of the products use.
  
 
Some Software Transparency efforts are focusing on Software Bill-of-Materials (SBOM) while others are more inclusive of all supply chain components. The [https://www.fda.gov/ U.S. Food and Drug Administration] (FDA) defines Cyber Bill-of-Materials (CBOM) as:
 
Some Software Transparency efforts are focusing on Software Bill-of-Materials (SBOM) while others are more inclusive of all supply chain components. The [https://www.fda.gov/ U.S. Food and Drug Administration] (FDA) defines Cyber Bill-of-Materials (CBOM) as:
 
<blockquote>''a list that includes but is not limited to commercial, open source, and off-the-shelf software and hardware components that are or could become susceptible to vulnerabilities.''</blockquote>
 
<blockquote>''a list that includes but is not limited to commercial, open source, and off-the-shelf software and hardware components that are or could become susceptible to vulnerabilities.''</blockquote>
  
There are multiple BOM standards including [https://cyclonedx.org/ CycloneDX], [https://spdx.org/ SPDX], and [https://www.iso.org/standard/65666.html SWID], each having their own strengths and use-cases they were designed to solve. Evaluating BOM standards to determine which are applicable to an organizations requirements should be part of an overall C-SCRM strategy.
+
There are multiple SBOM standards including [https://cyclonedx.org/ CycloneDX], [https://spdx.org/ SPDX], and [https://www.iso.org/standard/65666.html SWID], each having their own strengths and use-cases they were designed to solve. Evaluating SBOM standards to determine which are applicable to an organizations requirements should be part of an overall C-SCRM strategy.
  
 
== Component Identification ==
 
== Component Identification ==
Line 112: Line 111:
 
* Reduce the attack surface by excluding unnecessary direct and transitive dependencies
 
* Reduce the attack surface by excluding unnecessary direct and transitive dependencies
 
* Reduce the number of suppliers and use the highest quality components from those suppliers
 
* Reduce the number of suppliers and use the highest quality components from those suppliers
 +
* Standardize on a single component for each component type
 
* Establish a maximum level of acceptable risk for public repositories. Utilize private repositories in lieu of untrusted ones.
 
* Establish a maximum level of acceptable risk for public repositories. Utilize private repositories in lieu of untrusted ones.
 
* Automate component updates (from trusted repositories only)
 
* Automate component updates (from trusted repositories only)
 
* Provide time-boxed allowances every sprint to maintain component hygiene
 
* Provide time-boxed allowances every sprint to maintain component hygiene
 
* Establish a whitelist of acceptable licenses, a blacklist of prohibited licenses, and seek advice from counsel for all other licenses
 
* Establish a whitelist of acceptable licenses, a blacklist of prohibited licenses, and seek advice from counsel for all other licenses
* Automate the creation of bill-of-materials (BOM) for all deliverables
+
* Automate the creation of software bill-of-materials (SBOM) for all deliverables
* Leverage Package URL for describing components within BOMs
+
* Leverage Package URL for describing components within SBOMs
* Contractually require BOMs from vendors and embed their acquisition in the procurement process
+
* Contractually require SBOMs from vendors and embed their acquisition in the procurement process
* Automate the analysis of all third-party and open source components during Continuous Integration (CI), either by analyzing the files themselves, or by analyzing a BOM
+
* Automate the analysis of all third-party and open source components during Continuous Integration (CI), either by analyzing the files themselves, or by analyzing a SBOM
* Import BOMs into systems capable of tracking, analyzing, and proactively monitoring all components used by every asset in an environment (i.e. enterprise wide, entire cloud infrastructure, etc)
+
* Import SBOMs into systems capable of tracking, analyzing, and proactively monitoring all components used by every asset in an environment (i.e. enterprise wide, entire cloud infrastructure, etc)
  
 
== Tools Listing  ==
 
== Tools Listing  ==
Line 154: Line 154:
 
== References  ==
 
== References  ==
  
* https://csrc.nist.gov/projects/supply-chain-risk-management - Cyber Supply Chain Risk Management (C-SCRM)
+
*https://csrc.nist.gov/projects/supply-chain-risk-management - Cyber Supply Chain Risk Management (C-SCRM)
 
*http://stwww-production.herokuapp.com/calculator/ - Impact of software supply chain practices: Development Waste (Sonatype)
 
*http://stwww-production.herokuapp.com/calculator/ - Impact of software supply chain practices: Development Waste (Sonatype)
 
*https://www.fda.gov/downloads/MedicalDevices/DeviceRegulationandGuidance/GuidanceDocuments/UCM623529.pdf - Content of Premarket Submissions for Management of Cybersecurity in Medical Devices (FDA)
 
*https://www.fda.gov/downloads/MedicalDevices/DeviceRegulationandGuidance/GuidanceDocuments/UCM623529.pdf - Content of Premarket Submissions for Management of Cybersecurity in Medical Devices (FDA)
 
*https://cyclonedx.org/ - CycloneDX specification
 
*https://cyclonedx.org/ - CycloneDX specification
 
*https://spdx.org/ - Software Package Data Exchange (SPDX)
 
*https://spdx.org/ - Software Package Data Exchange (SPDX)
* https://www.iso.org/standard/65666.html - SWID (ISO/IEC 19770-2:2015)
+
*https://www.iso.org/standard/65666.html - SWID (ISO/IEC 19770-2:2015)
 
*https://github.com/package-url - Package URL specification and reference implementations
 
*https://github.com/package-url - Package URL specification and reference implementations
 +
*https://medium.com/@steve_springett/using-software-bill-of-materials-to-drive-change-and-reduce-risk-5901b7a339e3 - Using Software Bill-of-Materials to drive change and reduce risk
 
*https://cdn2.hubspot.net/hub/203759/file-1100864196-pdf/docs/Contrast_-_Insecure_Libraries_2014.pdf - The Unfortunate Reality of Insecure Libraries (Contrast Security)
 
*https://cdn2.hubspot.net/hub/203759/file-1100864196-pdf/docs/Contrast_-_Insecure_Libraries_2014.pdf - The Unfortunate Reality of Insecure Libraries (Contrast Security)
 
*https://safecode.org/wp-content/uploads/2014/06/SAFECode_Supply_Chain0709.pdf - Framework for Software Supply Chain Integrity (SAFECode)
 
*https://safecode.org/wp-content/uploads/2014/06/SAFECode_Supply_Chain0709.pdf - Framework for Software Supply Chain Integrity (SAFECode)

Revision as of 21:38, 19 March 2019

Component Analysis is the process of identifying potential areas of risk from the use of third-party and open-source software and hardware components. Component Analysis is a function within an overall Cyber Supply Chain Risk Management (C-SCRM) framework. A software-only subset of Component Analysis with limited scope is commonly referred to as Software Composition Analysis (SCA).

Any component that has the potential to adversely impact cyber supply-chain risk is a candidate for Component Analysis.

Common Risk Factors

Component Inventory

Having an accurate inventory of all third-party and open source components is pivotal for risk identification. Without such knowledge, other factors of Component Analysis become impractical to determine with high confidence. Use of dependency management solutions and/or Software Bill-of-Materials (SBOM) can aid in inventory creation.

Component Age

Components may have varying degrees of age acceptance criteria. Factors that impact acceptable age include the type of component, the ecosystem the component is a part of (Maven, NPM, etc), and the purpose of the component. The age of a component may signify use of outdated technology and may have a higher probability of being passed over by security researchers.

Outdated Components

Newer versions of components typically improve quality or performance in addition to providing new features. These improvements can be inherited by the applications that have a dependency on them. Components that are end-of-life (EOL) or end-of-support (EOS) also impact risk. Two common approaches to community supported open-source is:

  • Support the latest revision of the last (x) releases - (i.e. 4.3.6 and 4.2.9)
  • Support only the latest published version (i.e. 4.3.6 today and 4.4.0 tomorrow)

Depending on the risk appetite, it may be strategic to only use third-party and open source components that are supported.

With reference to Semantic Versioning terminology, API changes can be expected between major versions of a component, but are rare between minor versions and patches. Changes in a components API may result in longer remediation times if the components have not been continuously updated. Keeping components up-to-date can reduce remediation time when a rapid response is warranted.

Component analysis can identify outdated components as well as provide information about newer versions.

Known Vulnerabilities

Historically, known vulnerabilities referred to entries (CVEs) in the National Vulnerability Database (NVD). The NVD describes (via CPE) three types of components:

  • Applications (includes libraries and frameworks)
  • Operating Systems
  • Hardware

While the NVD may be the most recognizable source of vulnerability intelligence, it's not the only. There are multiple public and commercial sources of vulnerability intelligence. Having a known vulnerability doesn't require the vulnerability information be present in one of these sources. Simply being documented (i.e. social media post, defect tracker, commit log, release notes, etc) classifies the vulnerability as being known.

Component analysis will commonly identify known vulnerabilities from multiple sources of vulnerability intelligence.

Component Type

Frameworks and libraries have unique upgrade challenges and associated risk. Abstractions, coupling, and architectural design patterns may affect the risk of using a given component type. For example, logging libraries may be embedded throughout a large application, but replacing implementations can likely be automated. Likewise, replacing a web application framework for an alternative framework would likely be a high-risk endeavor leading to architectural changes, regressions, and code rewrites. Component type may also be used to determine if duplicate or similar functionally exists. For example, it's unlikely an application would need multiple XML parsers or cryptographic libraries. Risk can be reduced by minimizing the number of components for a given type. Evaluating the type should be part of every Component Analysis strategy.

Component Quantity

The number of third-party and open source components in a project should be evaluated. The cost of using open source can exponentially increase with every new component when there are hundreds or thousands of applications in a given environment. In addition to increased operational cost, a decrease in a development teams ability to maintain growing sets of components over time can be expected. This is especially true for teams with time-boxed constraints.

Repository Trust

Components in many software ecosystems are published and distributed to central repositories. Repositories have known threats. Some of the threats against public repositories include:

  • Typosquatting - naming a component in such as way as to take advantage of common misspelling
  • Organization/Group abuse - pretending to be a public person or entity and abusing the perceived trust
  • Malware through transfer - leveraging weak or absent code-signing requirements to spread malware through the transfer of an open source project from one maintainer to another
  • Cross Build Injection (XBI) - Abusing dependency resolution schemes and weak infrastructure controls to inject malicious components in place of safe ones

Public repositories that have code-signing and verification requirements have some level of trust, whereas public repositories without basic countermeasures do not. For no-trust or low-trust repositories, utilizing private repositories may be advantageous. Private repositories refer to repositories where access is limited, usually software that organizations install and control, or a commercially available service. Golden repositories containing vetted or whitelisted components are a common use-case for private repositories. Private repository services focusing on security may additionally provide anti-malware analysis and static source code analysis requirements prior to acceptance in the repository. When leveraging private repositories, it is important to have traceability to the components' repository of origin.

Pedigree

A component's pedigree (sometimes referred to as 'provenance') refers to the traceability of all changes (i.e. commits), releases, modifications, packaging, and distribution across the entire supply chain. In physical supply chains this is referred to as the Chain of Custody. Obtaining a components pedigree may involve a mixture of automation across multiple systems and suppliers, along with legal and verifiable supporting documentation. Component pedigree includes all supporting documentation of lineage and the attributes which make a component unique.

License

Third-party and open-source software typically has one or more licenses assigned. The chosen license may or may not allow certain types of usage, contain distribution requirements or limitations, or require specific actions if the component is modified. Component Analysis can identify the license(s) for a given component and may optionally provide guidance as to the nature of the license (i.e. copyright, copyleft, OSI approved, etc). Utilizing components with licenses which conflict with an organizations objectives or ability can create serious risk to the business.

Inherited Risk

Third-party and open source components often have dependencies on other components. A transitive dependency is when an application has a direct dependency on a component and that component has a dependency on another component. Transitive dependencies are common and are expected in highly modular ecosystems which values reuse over re-invent. Like any component, transitive dependencies have their own risk which is inherited by every component and application that relies on them. Components may additionally have specific runtime or environmental dependencies with implementation details not known or prescribed by the component. Component Analysis can aggregate the risk of all direct, transitive, runtime, and environmental dependencies providing a holistic view of inherited risk.

Project Health

There are many datapoints to consider when evaluating the health of an open source project.

  • Quality Controls and Metrics - The overall quality and controls for achieving and maintaining high-quality components may be a factor in risk evaluation. For software components, this refers to the use of unit and integration tests, linters and static analysis tools, the percentage of coverage, and results from various tools.
  • Community Engagement - The current and historical trend for a project and its maintainers to accept pull requests, answer defect and enhancement requests, and engage in productive collaboration with the community may be a factor in risk evaluation.
  • Vulnerability Analysis - Analyzing current and historical security vulnerabilities for timeline trends and for root-cause patterns may signify a projects ability to protect the community from future (and similar) issues. This activity may be a factor in risk evaluation.

Software Bill-of-Materials (SBOM)

Multiple efforts between government and industry are attempting to define Software Transparency. Some of these efforts will lead to increased compliance or regulatory requirements. Software Transparency is often achieved through the publishing of bill-of-materials (BOM). A BOM is synonymous to the list of ingredients on food packaging. Both are an implementation of transparency designed to provide consumers with information they can use to evaluate risk prior to consumption. A BOM has the added advantage of being useful for component analysis throughout the entire lifecycle of the products use.

Some Software Transparency efforts are focusing on Software Bill-of-Materials (SBOM) while others are more inclusive of all supply chain components. The U.S. Food and Drug Administration (FDA) defines Cyber Bill-of-Materials (CBOM) as:

a list that includes but is not limited to commercial, open source, and off-the-shelf software and hardware components that are or could become susceptible to vulnerabilities.

There are multiple SBOM standards including CycloneDX, SPDX, and SWID, each having their own strengths and use-cases they were designed to solve. Evaluating SBOM standards to determine which are applicable to an organizations requirements should be part of an overall C-SCRM strategy.

Component Identification

Component ecosystems generally devise different terminology and formats for representing components. This self-imposed fragmentation makes uniquely identifying and representing components difficult when referring to them outside of their respective ecosystems. Centralized databases such as the CPE Product Dictionary maintained by NIST adds additional fragmentation as the CPE vendor and product names often do not reflect reality.

Generally, a component will have a name and version. Components may optionally have a higher-level grouping identifier, commonly referred to as a groupId, organization, or vendor. When referencing components in a C-SCRM framework it is important to have a standard and uniform way to represent them. The Package URL specification provides a decentralized and uniform way to represent components.

scheme:type/namespace/name@version?qualifiers#subpath

For example:

pkg:deb/debian/[email protected]?arch=i386&distro=jessie
pkg:docker/cassandra@sha256:244fd47e07d1004f0aed9c
pkg:gem/[email protected]?platform=java
pkg:maven/org.apache.xmlgraphics/[email protected]?packaging=sources
pkg:npm/%40angular/[email protected]
pkg:nuget/[email protected]
pkg:pypi/[email protected]
pkg:rpm/fedora/[email protected]?arch=i386&distro=fedora-25

Open Source Policy

Open source policies provide guidance and governance to organizations looking to reduce third-party and open source risk. Policies typically include:

  • Restrictions on component age
  • Restrictions on outdated and EOL/EOS components
  • Prohibition of components with known vulnerabilities
  • Restrictions on public repository usage
  • Restrictions on acceptable licenses
  • Component update requirements
  • Blacklist of prohibited components and versions
  • Acceptable community contribution guidelines

While the open source policy is usually filled with restrictions, it provides an organizations security, development, and legal teams an opportunity to create solutions for healthy open source usage.

Recommendations

  • Limit the age of acceptable components to three years or less with exceptions being made for high-value, single purpose components that are still relevant
  • Prohibit the use of end-of-life (EOL) components
  • Prohibit the use of components with known vulnerabilities. Update components that are exploitable with high to moderate risk first.
  • Reduce the attack surface by excluding unnecessary direct and transitive dependencies
  • Reduce the number of suppliers and use the highest quality components from those suppliers
  • Standardize on a single component for each component type
  • Establish a maximum level of acceptable risk for public repositories. Utilize private repositories in lieu of untrusted ones.
  • Automate component updates (from trusted repositories only)
  • Provide time-boxed allowances every sprint to maintain component hygiene
  • Establish a whitelist of acceptable licenses, a blacklist of prohibited licenses, and seek advice from counsel for all other licenses
  • Automate the creation of software bill-of-materials (SBOM) for all deliverables
  • Leverage Package URL for describing components within SBOMs
  • Contractually require SBOMs from vendors and embed their acquisition in the procurement process
  • Automate the analysis of all third-party and open source components during Continuous Integration (CI), either by analyzing the files themselves, or by analyzing a SBOM
  • Import SBOMs into systems capable of tracking, analyzing, and proactively monitoring all components used by every asset in an environment (i.e. enterprise wide, entire cloud infrastructure, etc)

Tools Listing

Name Owner Licence Platforms
Black Duck Hub Synopsys Commercial Cross Platform
ClearlyDefined Open Source Initiative Open Source SaaS
DejaCode nexB Commercial SaaS
Dependency-Check OWASP Open Source Cross Platform
Dependency-Track OWASP Open Source Cross Platform
Dependabot Dependabot Commercial / Freemium SaaS
DepShield Sonatype Open Source Cross Platform / SaaS
DotNET Retire Retire.NET Project Open Source Cross Platform
FlexNet Code Insight Flexera Commercial Cross Platform
FOSSology Linux Foundation Open Source Cross Platform
Grafeas Grafeas Open Source Cross Platform
Greenkeeper Greenkeeper Open Source SaaS
OSS Review Toolkit HERE Open Source Cross Platform
Ion Channel SA Ion Channel Commercial SaaS
Libraries.io Tidelift Open Source SaaS
MergeBase MergeBase Commercial SaaS
NPM Audit NPM Open Source SaaS
PHP Security Checker SensioLabs Open Source SaaS
Renovate Key Location Open Source SaaS
Snyk Snyk Commercial / Freemium SaaS
SourceClear Veracode Commercial Cross Platform / SaaS
Nexus IQ Sonatype Commercial Cross Platform
Open Source Lifecycle Management WhiteSource Software Commercial Cross Platform / SaaS
Retire.js RetireJS Project Open Source Cross Platform
VulnDB Risk Based Security Commercial SaaS

References