Last updated
© 2024 JFrog Ltd All Rights Reserved
Last updated
SCA
Software Composition Analysis for source code and binary files
Contextual Analysis
Deep Contextual Analysis combining real-world exploitability and CVEs applicability
Secrets
Secrets Detection for source code and binary files
Infrastructure as Code (IaC)
Identify security exposures in your IaC
SAST
Discover vulnerabilities in the 1st party code