Features and Capabilities

JFrog Security User Guide

ft:sourceType
Ftml

Software Composition Analysis (SCA)

What it does:
Xray performs deep analysis of artifacts, builds, and Release Bundles to identify security issues, license compliance, and operational risk.

Why it matters:
Organizations need to proactively identify vulnerabilities, license compliance, and code quality in their open-source and proprietary code before releasing software.

Developer Experience & Shift-Left Security with Xray Scanning in IDEs and CLI

What it does:
JFrog Xray enables developers to identify and remediate security vulnerabilities early in the development lifecycle by integrating directly into IDEs and CLI tools. This shift-left approach ensures that security is addressed before code is committed or built.

For developers and DevOps engineers, JFrog Xray provides CLI-based security scanning through JFrog CLI.

Deep Recursive Scanning

What it does:
Unlike traditional scanners, Xray recursively scans all layers of software artifacts.

Key Capabilities:

  • File-based Analysis: Extracts and scans all files within an artifact.
  • Recursive Layer Inspection: Ensures all artifact layers are covered.
  • OS and Container Security: Scans multiple package types. For the full list, see Supported Technologies.

Why it matters:
Provides greater visibility into software components.

Impact Analysis

What it does:
Analyzes how vulnerabilities impact different components in an organization’s software dependency graph.

Key Capabilities:

  • Dependency Tracking: Identifies affected projects based on security issues.
  • Contextual Analysis: Determines real-world exploitability of vulnerabilities. (with JFrog Advanced Security)
  • Fix Version Detection: Suggests available security patches for affected components.

Why it matters:
Reduces false positives and prioritizes vulnerabilities that pose the most risk.

Policy-Based Security Enforcement

What it does:
Allows organizations to define security, compliance, and operational risk policies that enforce governance across software development and deployment.

Why it matters:
Trigger automatic actions regarding security issues, compliance, and operational risk before they progress in the SDLC process.

Operational Risk Management

What it does:
Detects risks beyond security vulnerabilities, such as outdated or deprecated software components.

Why it matters:
Ensures that unmaintained software does not introduce security risks.

Malicious Package Detection

What it does:
Identifies intentionally harmful open-source packages and machine-learning models.

Why it matters:
Prevents supply chain attacks caused by malicious components.

Software Bill of Materials (SBOM)

What it does:
Generates an SBOM (Software Bill of Materials), listing all software components and dependencies.

Why it matters:
Provides full visibility into software supply chains for compliance and security audits.

Advanced Reporting

What it does:
Generates detailed security, compliance, and operational risk reports to track vulnerabilities, license violations, and risk exposure.

Why it matters:
Helps organizations track security posture over time.

CI/CD Pipelines Integration

What it does:
Seamlessly integrates with CI/CD tools to scan software before deployment.

Key Capabilities:

  • Jenkins, GitHub Actions, GitLab CI, Azure DevOps Integration, Bamboo, TeamCity, and the JFrog CLI.
  • Automated Build Scanning: Prevents vulnerable builds by indicating that the build job should fail.

Why it matters:
Secure the CI/CD Pipeline and reduce remediation costs.