© 2024 JFrog Ltd All Rights Reserved
Last updated 4 months ago
SCA
Software Composition Analysis for source code and binary files
Contextual Analysis
Deep Contextual Analysis combining real-world exploitability and CVEs applicability
Secrets
Secrets Detection for source code and binary files
Infrastructure as Code (IaC)
Identify security exposures in your IaC
SAST
Discover vulnerabilities in the 1st party code
IDE
CLI
Frogbot
CI
SDKs