{"id":123334,"date":"2023-06-15T10:30:56","date_gmt":"2023-06-15T08:30:56","guid":{"rendered":"https:\/\/jfrog.com\/xray\/sca-scan\/"},"modified":"2026-01-29T14:01:44","modified_gmt":"2026-01-29T12:01:44","slug":"sca-scan","status":"publish","type":"page","link":"https:\/\/jfrog.com\/fr\/xray\/sca-scan\/","title":{"rendered":"Analyse SCA"},"content":{"rendered":"","protected":false},"excerpt":{"rendered":"","protected":false},"author":410,"featured_media":0,"parent":102864,"menu_order":761,"comment_status":"closed","ping_status":"closed","template":"templates\/lp-v2025.php","meta":{"inline_featured_image":false,"footnotes":""},"class_list":["post-123334","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v22.6 (Yoast SEO v22.6) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>SCA Scan | Identifier et r\u00e9soudre les vuln\u00e9rabilit\u00e9s | JFrog<\/title>\n<meta name=\"description\" content=\"S\u00e9curit\u00e9 et conformit\u00e9 pour votre supply chain. D\u00e9tectez et neutralisez les risques li\u00e9s \u00e0 l\u2019open source gr\u00e2ce \u00e0 l\u2019analyse de vuln\u00e9rabilit\u00e9s SCA JFrog Xray.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/jfrog.com\/fr\/wp-json\/wp\/v2\/pages\/123334\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Analyse SCA\" \/>\n<meta property=\"og:description\" content=\"S\u00e9curit\u00e9 et conformit\u00e9 pour votre supply chain. D\u00e9tectez et neutralisez les risques li\u00e9s \u00e0 l\u2019open source gr\u00e2ce \u00e0 l\u2019analyse de vuln\u00e9rabilit\u00e9s SCA JFrog Xray.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/jfrog.com\/fr\/xray\/sca-scan\/\" \/>\n<meta property=\"og:site_name\" content=\"JFrog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/artifrog\" \/>\n<meta property=\"article:modified_time\" content=\"2026-01-29T12:01:44+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/speedmedia2.jfrog.com\/08612fe1-9391-4cf3-ac1a-6dd49c36b276\/media.jfrog.com\/wp-content\/uploads\/2018\/06\/20132021\/JFROG.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"628\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@jfrog\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/jfrog.com\/fr\/xray\/sca-scan\/\",\"url\":\"https:\/\/jfrog.com\/fr\/xray\/sca-scan\/\",\"name\":\"SCA Scan | Identifier et r\u00e9soudre les vuln\u00e9rabilit\u00e9s | JFrog\",\"isPartOf\":{\"@id\":\"https:\/\/jfrog.com\/fr\/#website\"},\"datePublished\":\"2023-06-15T08:30:56+00:00\",\"dateModified\":\"2026-01-29T12:01:44+00:00\",\"description\":\"S\u00e9curit\u00e9 et conformit\u00e9 pour votre supply chain. D\u00e9tectez et neutralisez les risques li\u00e9s \u00e0 l\u2019open source gr\u00e2ce \u00e0 l\u2019analyse de vuln\u00e9rabilit\u00e9s SCA JFrog Xray.\",\"breadcrumb\":{\"@id\":\"https:\/\/jfrog.com\/fr\/xray\/sca-scan\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/jfrog.com\/fr\/xray\/sca-scan\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/jfrog.com\/fr\/xray\/sca-scan\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/jfrog.com\/fr\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Page d&#8217;accueil Xray \u2013 2023\",\"item\":\"https:\/\/jfrog.com\/fr\/xray\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Analyse SCA\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/jfrog.com\/fr\/#website\",\"url\":\"https:\/\/jfrog.com\/fr\/\",\"name\":\"JFrog\",\"description\":\"Deliver Trusted Software Releases at Speed and Scale\",\"publisher\":{\"@id\":\"https:\/\/jfrog.com\/fr\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/jfrog.com\/fr\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/jfrog.com\/fr\/#organization\",\"name\":\"JFrog\",\"url\":\"https:\/\/jfrog.com\/fr\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/jfrog.com\/fr\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/speedmedia2.jfrog.com\/08612fe1-9391-4cf3-ac1a-6dd49c36b276\/media.jfrog.com\/wp-content\/uploads\/2025\/05\/27095207\/Logo.svg\",\"contentUrl\":\"https:\/\/speedmedia2.jfrog.com\/08612fe1-9391-4cf3-ac1a-6dd49c36b276\/media.jfrog.com\/wp-content\/uploads\/2025\/05\/27095207\/Logo.svg\",\"width\":74,\"height\":73,\"caption\":\"JFrog\"},\"image\":{\"@id\":\"https:\/\/jfrog.com\/fr\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/artifrog\",\"https:\/\/x.com\/jfrog\",\"https:\/\/www.linkedin.com\/company\/455737\",\"https:\/\/www.youtube.com\/channel\/UCh2hNg76zo3d1qQqTWIQxDg\",\"https:\/\/www.wikidata.org\/wiki\/Q98608948\"],\"description\":\"We set out on our Liquid Software journey in 2008, with the mission to transform the way enterprises manage and release software updates. The world expects software to update continuously, securely, non-intrusively and without user intervention. This hyper-connected experience can only be enabled by automation with an end-to-end DevOps platform and a binary-centric focus. With this in mind, we\u2019ve developed the JFrog Platform, ushering in a new era of DevOps and DevSecOps standards that power continuous updates. More than a decade after our founding, with thousands of customers and millions of users globally, JFrog has become the \u201cDatabase of DevOps\u201d and the de-facto standard in release and update management.\",\"legalName\":\"Jfrog, Inc.\",\"numberOfEmployees\":{\"@type\":\"QuantitativeValue\",\"minValue\":\"1001\",\"maxValue\":\"5000\"}}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"SCA Scan | Identifier et r\u00e9soudre les vuln\u00e9rabilit\u00e9s | JFrog","description":"S\u00e9curit\u00e9 et conformit\u00e9 pour votre supply chain. D\u00e9tectez et neutralisez les risques li\u00e9s \u00e0 l\u2019open source gr\u00e2ce \u00e0 l\u2019analyse de vuln\u00e9rabilit\u00e9s SCA JFrog Xray.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/jfrog.com\/fr\/wp-json\/wp\/v2\/pages\/123334","og_locale":"fr_FR","og_type":"article","og_title":"Analyse SCA","og_description":"S\u00e9curit\u00e9 et conformit\u00e9 pour votre supply chain. D\u00e9tectez et neutralisez les risques li\u00e9s \u00e0 l\u2019open source gr\u00e2ce \u00e0 l\u2019analyse de vuln\u00e9rabilit\u00e9s SCA JFrog Xray.","og_url":"https:\/\/jfrog.com\/fr\/xray\/sca-scan\/","og_site_name":"JFrog","article_publisher":"https:\/\/www.facebook.com\/artifrog","article_modified_time":"2026-01-29T12:01:44+00:00","og_image":[{"width":1200,"height":628,"url":"https:\/\/speedmedia2.jfrog.com\/08612fe1-9391-4cf3-ac1a-6dd49c36b276\/media.jfrog.com\/wp-content\/uploads\/2018\/06\/20132021\/JFROG.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_site":"@jfrog","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/jfrog.com\/fr\/xray\/sca-scan\/","url":"https:\/\/jfrog.com\/fr\/xray\/sca-scan\/","name":"SCA Scan | Identifier et r\u00e9soudre les vuln\u00e9rabilit\u00e9s | JFrog","isPartOf":{"@id":"https:\/\/jfrog.com\/fr\/#website"},"datePublished":"2023-06-15T08:30:56+00:00","dateModified":"2026-01-29T12:01:44+00:00","description":"S\u00e9curit\u00e9 et conformit\u00e9 pour votre supply chain. D\u00e9tectez et neutralisez les risques li\u00e9s \u00e0 l\u2019open source gr\u00e2ce \u00e0 l\u2019analyse de vuln\u00e9rabilit\u00e9s SCA JFrog Xray.","breadcrumb":{"@id":"https:\/\/jfrog.com\/fr\/xray\/sca-scan\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/jfrog.com\/fr\/xray\/sca-scan\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/jfrog.com\/fr\/xray\/sca-scan\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/jfrog.com\/fr\/"},{"@type":"ListItem","position":2,"name":"Page d&#8217;accueil Xray \u2013 2023","item":"https:\/\/jfrog.com\/fr\/xray\/"},{"@type":"ListItem","position":3,"name":"Analyse SCA"}]},{"@type":"WebSite","@id":"https:\/\/jfrog.com\/fr\/#website","url":"https:\/\/jfrog.com\/fr\/","name":"JFrog","description":"Deliver Trusted Software Releases at Speed and Scale","publisher":{"@id":"https:\/\/jfrog.com\/fr\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/jfrog.com\/fr\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/jfrog.com\/fr\/#organization","name":"JFrog","url":"https:\/\/jfrog.com\/fr\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/jfrog.com\/fr\/#\/schema\/logo\/image\/","url":"https:\/\/speedmedia2.jfrog.com\/08612fe1-9391-4cf3-ac1a-6dd49c36b276\/media.jfrog.com\/wp-content\/uploads\/2025\/05\/27095207\/Logo.svg","contentUrl":"https:\/\/speedmedia2.jfrog.com\/08612fe1-9391-4cf3-ac1a-6dd49c36b276\/media.jfrog.com\/wp-content\/uploads\/2025\/05\/27095207\/Logo.svg","width":74,"height":73,"caption":"JFrog"},"image":{"@id":"https:\/\/jfrog.com\/fr\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/artifrog","https:\/\/x.com\/jfrog","https:\/\/www.linkedin.com\/company\/455737","https:\/\/www.youtube.com\/channel\/UCh2hNg76zo3d1qQqTWIQxDg","https:\/\/www.wikidata.org\/wiki\/Q98608948"],"description":"We set out on our Liquid Software journey in 2008, with the mission to transform the way enterprises manage and release software updates. The world expects software to update continuously, securely, non-intrusively and without user intervention. This hyper-connected experience can only be enabled by automation with an end-to-end DevOps platform and a binary-centric focus. With this in mind, we\u2019ve developed the JFrog Platform, ushering in a new era of DevOps and DevSecOps standards that power continuous updates. More than a decade after our founding, with thousands of customers and millions of users globally, JFrog has become the \u201cDatabase of DevOps\u201d and the de-facto standard in release and update management.","legalName":"Jfrog, Inc.","numberOfEmployees":{"@type":"QuantitativeValue","minValue":"1001","maxValue":"5000"}}]}},"_links":{"self":[{"href":"https:\/\/jfrog.com\/fr\/wp-json\/wp\/v2\/pages\/123334","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/jfrog.com\/fr\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/jfrog.com\/fr\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/jfrog.com\/fr\/wp-json\/wp\/v2\/users\/410"}],"replies":[{"embeddable":true,"href":"https:\/\/jfrog.com\/fr\/wp-json\/wp\/v2\/comments?post=123334"}],"version-history":[{"count":11,"href":"https:\/\/jfrog.com\/fr\/wp-json\/wp\/v2\/pages\/123334\/revisions"}],"predecessor-version":[{"id":162778,"href":"https:\/\/jfrog.com\/fr\/wp-json\/wp\/v2\/pages\/123334\/revisions\/162778"}],"up":[{"embeddable":true,"href":"https:\/\/jfrog.com\/fr\/wp-json\/wp\/v2\/pages\/102864"}],"wp:attachment":[{"href":"https:\/\/jfrog.com\/fr\/wp-json\/wp\/v2\/media?parent=123334"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}