Jump to main content
HCL Logo Product Documentation
Customer Support Software Academy Community Forums
HCL AppScan on Cloud Help
  • Getting started
  • Navigation
  • Administration
  • Dynamic analysis
  • Interactive monitoring
  • Software Composition Analysis
  • Static analysis
  • Results
  • Troubleshooting
  • FAQ & Reference
  1. Home
  2. Software Composition Analysis

    Use Software Composition Analysis (SCA) to scan for security vulnerabilities in open source and third-party packages used by your code. SCA includes Intelligent Finding Analytics (IFA) and Intelligent Code Analytics (ICA).

  3. Scanning libraries and third-party code for security vulnerabilities

    To scan open source libraries and third-party code for security vulnerabilities, follow the steps in these topics.

  • Getting started

    Welcome to the documentation for HCL AppScan on Cloud, where you can find information about how to install, maintain, and use this service.

  • Navigation

    This section describes the items on the main AppScan on Cloud menu bar, with links to more detailed information.

  • Administration

    Define users, applications, policies, and configure DevOps integrations.

  • Dynamic analysis

    AppScan on Cloud performs security scans for web-applications for production, staging and development environments. For development environments it is aided by Private Site Scanning technology to scan applications not accessible to the open Internet.

  • Interactive monitoring

    Using an agent installed on your application, ASoC identifies security vulnerabilities in your application during runtime by monitoring all interactions, both legitimate and malicious. The process is "passive," in the sense that IAST does not send its own tests, and can therefore run indefinitely.

  • Software Composition Analysis

    Use Software Composition Analysis (SCA) to scan for security vulnerabilities in open source and third-party packages used by your code. SCA includes Intelligent Finding Analytics (IFA) and Intelligent Code Analytics (ICA).

    • About Software Composition Analysis

      Software Composition Analysis (SCA) locates and analyzes open source and third-party packages used by your code.

    • System requirements for SCA

      The types of files that can be scanned by ASoC when you perform open source testing.

    • Scanning libraries and third-party code for security vulnerabilities

      To scan open source libraries and third-party code for security vulnerabilities, follow the steps in these topics.

      • Configure an open source scan in AppScan on Cloud

      • Configuring a scan using AppScan Go!

        AppScan Go! steps you through configuring and running a static scan. You run the scan in the cloud or use a plugin to automate scanning.

      • Generating an IRX file using the command-line interface (CLI)

        To initiate an analysis of your files, you must generate an IRX file to submit for scanning. To use the CLI to generate the IRX file, follow these instructions.

      • Generating in IRX file using a plugin or IDE
      • Runtime Software Composition Analysis

        Identify and manage vulnerabilities in open source components and libraries used by an application at runtime.

    • SCA scan results

      Features available in SCA scan results.

  • Static analysis

    Use static analysis (SAST) to scan for security vulnerabilities in web and desktop applications. Static analysis includes Intelligent Finding Analytics (IFA) and Intelligent Code Analytics (ICA).

  • Results

    The Scans and Sessions page lists the scans under the categories DAST, SAST, SCA, and IAST, where you can view your scan results, including scan statistics. To view, rescan, or download reports, select a scan.

  • Troubleshooting

    If you experience problems with this service, you can perform these troubleshooting tasks to determine the corrective action to take.

  • FAQ & Reference

    Frequently asked questions, information about integrating ASoC into the product lifecycle (SDLC), and ASoC API documentation.

Scanning open source libraries and third-party code for security vulnerabilities

To scan open source libraries and third-party code for security vulnerabilities, follow the steps in these topics.

  • Configure an open source scan in AppScan on Cloud
  • Configuring a scan using AppScan Go!
  • Generating an IRX file using the command line interface (CLI)
  • Generating an IRX file using a plugin or IDE
  • Share: Email
  • Twitter
  • Disclaimer
  • Privacy
  • Terms of use
  • Cookie Preferences