Welcome to the JFrog Applications Doc Hub
Shift Left with JFrog Security
SCA
Software Composition Analysis for source code and binary files
Contextual Analysis
Deep Contextual Analysis combining real-world exploitability and CVEs applicability
Secrets
Secrets Detection for source code and binary files
Infrastructure as Code (IaC)
Identify security exposures in your IaC
SAST
Discover vulnerabilities in the 1st party code
Last updated