{"id":84293,"date":"2021-05-18T00:00:19","date_gmt":"2021-05-17T22:00:19","guid":{"rendered":"https:\/\/jfrog.com\/?p=84293"},"modified":"2021-11-18T18:15:36","modified_gmt":"2021-11-18T16:15:36","slug":"whats-new-with-jfrog-xray-and-devsecops","status":"publish","type":"post","link":"https:\/\/jfrog.com\/ja\/blog\/whats-new-with-jfrog-xray-and-devsecops\/","title":{"rendered":"JFrog Xray\u3068DevSecOps\u306e\u65b0\u6a5f\u80fd\u306b\u3064\u3044\u3066"},"content":{"rendered":"<p><img decoding=\"async\" class=\"alignnone size-full wp-image-75120\" src=\"https:\/\/media.jfrog.com\/wp-content\/uploads\/2021\/05\/11170745\/863x300-2.png\" alt=\"\" width=\"863\" height=\"300\" srcset=\"https:\/\/speedmedia2.jfrog.com\/08612fe1-9391-4cf3-ac1a-6dd49c36b276\/media.jfrog.com\/wp-content\/uploads\/2021\/05\/11170745\/863x300-2.png?speedsize=w_863 863w, https:\/\/speedmedia2.jfrog.com\/08612fe1-9391-4cf3-ac1a-6dd49c36b276\/media.jfrog.com\/wp-content\/uploads\/2021\/05\/11170745\/863x300-2.png?speedsize=w_300 300w, https:\/\/speedmedia2.jfrog.com\/08612fe1-9391-4cf3-ac1a-6dd49c36b276\/media.jfrog.com\/wp-content\/uploads\/2021\/05\/11170745\/863x300-2.png?speedsize=w_768 768w\" sizes=\"(max-width: 863px) 100vw, 863px\" \/><\/p>\n<p><span style=\"font-weight: 400\">JFrog <\/span><a href=\"https:\/\/jfrog.com\/ja\/platform\/\"><span style=\"font-weight: 400\">DevOps Platform<\/span><\/a><span style=\"font-weight: 400\">\u306e\u54c1\u8cea\u3068\u6a5f\u80fd\u3092\u5411\u4e0a\u3059\u308b\u305f\u3081\u3001\u7279\u306b<\/span><a href=\"https:\/\/jfrog.com\/ja\/learn\/devsecops\/\"><span style=\"font-weight: 400\">DevSecOps<\/span><\/a><span style=\"font-weight: 400\">\u306e\u4e16\u754c\u3067\u306f<\/span><a href=\"https:\/\/jfrog.com\/blog\/devops-dozen-recognizes-xray-as-best-devsecops-solution-2020\/\"><span style=\"font-weight: 400\">\u53d7\u8cde\u6b74\u306e\u3042\u308bJFrog Xray<\/span><\/a><span style=\"font-weight: 400\">\u3092\u3055\u3089\u306b\u5f37\u5316\u3059\u308b\u5f37\u529b\u306a\u65b0\u6a5f\u80fd\u3092\u8ffd\u52a0\u3057\u3066\u3044\u307e\u3059\u3002<\/span><\/p>\n<p><span style=\"font-weight: 400\">Xray\u306f\u30aa\u30fc\u30d7\u30f3\u30bd\u30fc\u30b9\u30bd\u30d5\u30c8\u30a6\u30a7\u30a2\u306e\u8106\u5f31\u6027\u3084\u30e9\u30a4\u30bb\u30f3\u30b9\u306e\u30b3\u30f3\u30d7\u30e9\u30a4\u30a2\u30f3\u30b9\u9055\u53cd\u3092\u8fc5\u901f\u304b\u3064\u7d99\u7d9a\u7684\u306b\u7279\u5b9a\u3059\u308b\u305f\u3081\u306b\u3001\u4e16\u754c\u4e2d\u306e\u958b\u767a\u8005\u3084DevSecOps\u30c1\u30fc\u30e0\u304b\u3089\u4fe1\u983c\u3055\u308c\u3066\u3044\u308b\u30e6\u30cb\u30d0\u30fc\u30b5\u30eb\u306a<\/span><a href=\"https:\/\/jfrog.com\/xray\/\"><span style=\"font-weight: 400\">\u30bd\u30d5\u30c8\u30a6\u30a7\u30a2\u69cb\u6210\u5206\u6790\uff08SCA\uff09<\/span><\/a><span style=\"font-weight: 400\">\u30bd\u30ea\u30e5\u30fc\u30b7\u30e7\u30f3\u3068\u3057\u3066\u306e\u5730\u4f4d\u3092\u78ba\u7acb\u3057\u3066\u3044\u307e\u3059\u3002<\/span><\/p>\n<h2><span style=\"font-weight: 400\">Conan\u3068C\/C++\u30b5\u30dd\u30fc\u30c8<\/span><\/h2>\n<p><span style=\"font-weight: 400\">Xray\u306f\u696d\u754c\u552f\u4e00\u306e<\/span><a href=\"https:\/\/jfrog.com\/ja\/artifact-management\/\"><span style=\"font-weight: 400\">\u30e6\u30cb\u30d0\u30fc\u30b5\u30eb\u30fb\u30ea\u30dd\u30b8\u30c8\u30ea\u30fb\u30de\u30cd\u30fc\u30b8\u30e3<\/span><\/a><span style=\"font-weight: 400\">\u3067\u3042\u308a\u3001<\/span><a href=\"https:\/\/jfrog.com\/ja\/container-registry\/\"><span style=\"font-weight: 400\">\u30b3\u30f3\u30c6\u30ca\u30fb\u30ec\u30b8\u30b9\u30c8\u30ea<\/span><\/a><span style=\"font-weight: 400\">\u3067\u3042\u308bJFrog Artifactory\u306b\u30c7\u30d7\u30ed\u30a4\u3055\u308c\u305f<\/span><a href=\"https:\/\/conan.io\/\"><span style=\"font-weight: 400\">Conan\u30d1\u30c3\u30b1\u30fc\u30b8<\/span><\/a><span style=\"font-weight: 400\">\u3001C\/C++\u30d3\u30eb\u30c9\u3092\u30b9\u30ad\u30e3\u30f3\u3057\u307e\u3059\u3002Conan\u306fC\/C++\u8a00\u8a9e\u7528\u306e\u4f9d\u5b58\u6027\u304a\u3088\u3073\u30d1\u30c3\u30b1\u30fc\u30b8\u30de\u30cd\u30fc\u30b8\u30e3\u3067\u30d5\u30ea\u30fc\u304b\u3064\u30aa\u30fc\u30d7\u30f3\u30bd\u30fc\u30b9\u3067\u3042\u308a\u3001\u3059\u3079\u3066\u306eOS\u30d7\u30e9\u30c3\u30c8\u30d5\u30a9\u30fc\u30e0\u3067\u52d5\u4f5c\u3057\u307e\u3059\u3002\u307e\u305f\u3001CMake\u3084Visual Studio\u306a\u3069\u306e\u3042\u3089\u3086\u308b\u30d3\u30eb\u30c9\u30b7\u30b9\u30c6\u30e0\u3084\u72ec\u81ea\u306e\u30d3\u30eb\u30c9\u30b7\u30b9\u30c6\u30e0\u3068\u3082\u7d71\u5408\u3057\u307e\u3059\u3002Conan\u306e\u5f37\u529b\u306a\u7279\u5fb4\u306f\u3001\u3042\u3089\u3086\u308b\u30d7\u30e9\u30c3\u30c8\u30d5\u30a9\u30fc\u30e0\u3084\u69cb\u6210\u306b\u5bfe\u5fdc\u3057\u305f\u30b3\u30f3\u30d1\u30a4\u30eb\u6e08\u307f\u306e\u30d0\u30a4\u30ca\u30ea\u3092\u4f5c\u6210\u30fb\u7ba1\u7406\u3067\u304d\u308b\u3053\u3068\u3067\u3059\u3002<\/span><\/p>\n<p><span style=\"font-weight: 400\">Xray\u306fConan\u3068C\/C++\u306e\u4e3b\u306b\u3053\u308c\u30894\u3064\u306e\u30e6\u30fc\u30b9\u30b1\u30fc\u30b9\u3092\u30b5\u30dd\u30fc\u30c8\u3057\u3066\u3044\u307e\u3059\u3002<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">ConanCenter\u304b\u3089Artifactory\u306b\u30c0\u30a6\u30f3\u30ed\u30fc\u30c9\u3055\u308c\u305f\u30d1\u30c3\u30b1\u30fc\u30b8\u3092\u30b9\u30ad\u30e3\u30f3<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Artifactory\u306b\u30a2\u30c3\u30d7\u30ed\u30fc\u30c9\u3055\u308c\u305fConan\u3067\u4f5c\u6210\u3055\u308c\u305f\u30d1\u30c3\u30b1\u30fc\u30b8\u3092\u30b9\u30ad\u30e3\u30f3<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Conan\u30d1\u30c3\u30b1\u30fc\u30b8\u3092\u69cb\u7bc9\u3057\u3001Xray\u3092CI\u30d7\u30ed\u30bb\u30b9\u306b\u7d71\u5408\u3057\u3066\u3044\u308b\u5834\u5408\u3001\u305d\u308c\u3089\u306eConan\u30d3\u30eb\u30c9\u3092\u30b9\u30ad\u30e3\u30f3<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Conan\u3092\u672a\u4f7f\u7528\u3067\u3082C++\u306e\u30d3\u30eb\u30c9\u3092\u30b9\u30ad\u30e3\u30f3<\/span><\/li>\n<\/ul>\n<h2><span style=\"font-weight: 400\">CVSS v3\u30b5\u30dd\u30fc\u30c8<\/span><\/h2>\n<p><span style=\"font-weight: 400\">CVSS\uff08Common Vulnerability Scoring System\uff09\u306f\u30bd\u30d5\u30c8\u30a6\u30a7\u30a2\u306e\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u8106\u5f31\u6027\u306e\u6df1\u523b\u5ea6\u3092\u8a55\u4fa1\u3059\u308b\u305f\u3081\u306e\u30aa\u30fc\u30d7\u30f3\u306a\u696d\u754c\u6a19\u6e96\u3067\u3059\u3002\u3053\u306e\u30b9\u30b3\u30a2\u30ea\u30f3\u30b0\u30a2\u30eb\u30b4\u30ea\u30ba\u30e0\u306f\u60aa\u7528\u306e\u5bb9\u6613\u3055\u3068\u5f71\u97ff\u3092\u8fd1\u4f3c\u7684\u306b\u793a\u3059\u3044\u304f\u3064\u304b\u306e\u6307\u6a19\u3092\u7528\u3044\u3001\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u8106\u5f31\u6027\u306b\u6df1\u523b\u5ea6\u306e\u30b9\u30b3\u30a2\u3092\u5272\u308a\u5f53\u3066\u307e\u3059\u3002Xray\u306f\u4ee5\u4e0b\u306e2\u3064\u306e\u7570\u306a\u308b\u30bd\u30fc\u30b9\u304b\u3089\u30b9\u30b3\u30a2\u3068\u6df1\u523b\u5ea6\u3092\u53ce\u96c6\u3057\u307e\u3059\u3002<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400\"><b>NVD<\/b><span style=\"font-weight: 400\">: National Vulnerability Database\u306b\u306f\u65e2\u77e5\u306e\u8106\u5f31\u6027\u304c\u305d\u308c\u305e\u308c\u306eCVSS\u30b9\u30b3\u30a2\u3068\u3068\u3082\u306b\u767b\u9332\u3055\u308c\u3066\u3044\u307e\u3059<\/span><\/li>\n<li style=\"font-weight: 400\"><b>OS Package Security Advisory<\/b><span style=\"font-weight: 400\">: \u3044\u304f\u3064\u304b\u306e\u30aa\u30fc\u30d7\u30f3\u30bd\u30fc\u30b9\u30fb\u30aa\u30da\u30ec\u30fc\u30c6\u30a3\u30f3\u30b0\u30fb\u30b7\u30b9\u30c6\u30e0\u306f\u30aa\u30da\u30ec\u30fc\u30c6\u30a3\u30f3\u30b0\u30fb\u30b7\u30b9\u30c6\u30e0\u30fb\u30d1\u30c3\u30b1\u30fc\u30b8\u5185\u306e\u8106\u5f31\u6027\u3092\u3055\u3089\u306b\u5206\u6790\u3057\u305f\u72ec\u81ea\u306e\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30fb\u30c8\u30e9\u30c3\u30ab\u30fc\u3092\u4fdd\u6301\u3057\u3066\u3044\u307e\u3059 <\/span><\/li>\n<\/ul>\n<h3><span style=\"font-weight: 400\">\u30b9\u30b3\u30a2\u30ec\u30f3\u30b8\u3068\u6df1\u523b\u5ea6\u30ec\u30d9\u30eb<\/span><\/h3>\n<p><span style=\"font-weight: 400\">\u305d\u306e\u76ee\u7684\u306f\u8105\u5a01\u306e\u30ec\u30d9\u30eb\u306b\u5fdc\u3058\u305f\u5bfe\u5fdc\u3084\u30ea\u30bd\u30fc\u30b9\u306e\u512a\u5148\u9806\u4f4d\u3092\u6c7a\u3081\u3089\u308c\u308b\u3088\u3046\u306b\u3059\u308b\u3053\u3068\u3067\u3059\u3002\u30b9\u30b3\u30a2\u306f0\u304b\u308910\u307e\u3067\u3042\u308a\u300110\u304c\u6700\u3082\u9ad8\u3044\u6df1\u523b\u5ea6\u3068\u306a\u308a\u307e\u3059\u3002CVSS v3\u3067\u306f\u6b21\u306e\u3088\u3046\u306a\u6df1\u523b\u5ea6\u306e\u8aac\u660e\u3082\u3042\u308a\u307e\u3059\u3002<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Critical<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">High<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Medium<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Low<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Unknown<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400\">Xray\u3067\u8a2d\u5b9a\u3057\u305f\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30eb\u30fc\u30eb\u306f<\/span><a href=\"http:\/\/www.jfrog.com\/confluence\/display\/JFROG\/Creating+Xray+Policies+and+Rules\"><span style=\"font-weight: 400\">Xray\u306e\u30dd\u30ea\u30b7\u30fc\u3068\u30eb\u30fc\u30eb\u306e\u4f5c\u6210<\/span><\/a><span style=\"font-weight: 400\">\u3067\u8aac\u660e\u3057\u305f\u3088\u3046\u306b\u9055\u53cd\u306b\u5bfe\u3059\u308bCVSS v3\u30b9\u30b3\u30a2\u307e\u305f\u306f\u6df1\u523b\u5ea6\u30ec\u30d9\u30eb\u306b\u5bfe\u3057\u3066\u6e2c\u5b9a\u3055\u308c\u307e\u3059\u3002Xray\u306f\u5f15\u304d\u7d9a\u304dCVSS v2\u30b9\u30b3\u30a2\u30ea\u30f3\u30b0\u3092\u30b5\u30dd\u30fc\u30c8\u3057\u307e\u3059\u304c\u3001CVSS v3\u30b9\u30b3\u30a2\u304c\u5229\u7528\u3067\u304d\u306a\u3044\u5834\u5408\u306b\u306e\u307f\u4f7f\u7528\u3057\u307e\u3059\u3002<\/span><\/p>\n<h2><span style=\"font-weight: 400\">Red Hat Security Scanner\u8a8d\u5b9a<\/span><\/h2>\n<p><span style=\"font-weight: 400\">JFrog Xray\u306f<a href=\"https:\/\/connect.redhat.com\/partner-with-us\/red-hat-vulnerability-scanner-certification\">Red Hat Partner Vulnerability Scanner\u8a8d\u5b9a\u30d7\u30ed\u30b0\u30e9\u30e0<\/a>\u306b\u7d71\u5408\u30d1\u30fc\u30c8\u30ca\u30fc\u3068\u3057\u3066Red Hat\u304b\u3089\u8a8d\u5b9a\u3055\u308c\u307e\u3057\u305f\u3002\u8a8d\u5b9a\u3092\u53d7\u3051\u305f\u3053\u3068\u3067\u3001JFrog Xray\u306b\u3088\u3063\u3066\u7279\u5b9a\u3055\u308c\u305f\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u8106\u5f31\u6027\u3068\u30e9\u30a4\u30bb\u30f3\u30b9\u30b3\u30f3\u30d7\u30e9\u30a4\u30a2\u30f3\u30b9\u306e\u30c7\u30fc\u30bf\u304c\u6b63\u78ba\u3067\u3042\u308a\u3001Red Hat\u30d1\u30c3\u30b1\u30fc\u30b8\u306b\u5bfe\u3057\u3066\u671f\u5f85\u3055\u308c\u308b\u7d50\u679c\u3068\u4e00\u81f4\u3057\u3066\u3044\u308b\u3053\u3068\u304c\u4fdd\u8a3c\u3055\u308c\u3001\u4fe1\u983c\u3067\u304d\u308b\u8a8d\u5b9a\u30bd\u30fc\u30b9\u306b\u57fa\u3065\u3044\u305f\u6b63\u78ba\u306a\u30ea\u30b9\u30af\u8a55\u4fa1\u304c\u53ef\u80fd\u306b\u306a\u308a\u307e\u3059\u3002\u3053\u308c\u306f\u3001RPM\u30d1\u30c3\u30b1\u30fc\u30b8\u3092\u4f7f\u7528\u3057\u3066\u3044\u308b\u4f01\u696d\u304c\u81ea\u4fe1\u3092\u6301\u3063\u3066\u3001JFrog Platform\u3092DevSecOps\u30d7\u30e9\u30c3\u30c8\u30d5\u30a9\u30fc\u30e0\u3068\u3057\u3066\u4f7f\u7528\u3067\u304d\u308b\u3053\u3068\u3092\u610f\u5473\u3057\u307e\u3059\u3002 <\/span><\/p>\n<p><span style=\"font-weight: 400\">Xray\u306eVulnerability Scanner\u8a8d\u5b9a\u306b\u52a0\u3048\u3066\u3001JFrog Platform\u306f\u4ee5\u4e0b\u306e\u8a8d\u5b9a\u3082\u53d7\u3051\u3066\u3044\u307e\u3059\u3002<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400\"><b>Red Hat Certified OpenShift Operator<\/b><span style=\"font-weight: 400\"> \uff08JFrog Artifactory\u3068JFrog Xray\uff09\u306b\u3088\u308a\u3001\u30a4\u30f3\u30b9\u30c8\u30fc\u30eb\u3068\u81ea\u52d5\u5316\u3092\u4fc3\u9032<\/span><\/li>\n<li style=\"font-weight: 400\"><b>Red Hat Certified UBI Container Image<span style=\"font-weight: 400\">\uff08JFrog Artifactory\uff09Artifactory\u304c\u52d5\u4f5c\u3059\u308b\u57fa\u672c\u7684\u306a\u30aa\u30da\u30ec\u30fc\u30c6\u30a3\u30f3\u30b0\u30b7\u30b9\u30c6\u30e0\u306e\u4fe1\u983c\u6027\u3001\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u3001\u30d1\u30d5\u30a9\u30fc\u30de\u30f3\u30b9\u306e\u5411\u4e0a\u3092\u4fdd\u8a3c<\/span><\/b><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400\">\u3053\u308c\u3089\u306e\u65b0\u6a5f\u80fd\u306f\u4f01\u696d\u306b\u3068\u3063\u3066DevOps\u306e\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u304c\u91cd\u8981\u306b\u306a\u308b\u4e2d\u3067\u3001\u6025\u901f\u306b\u6a5f\u80fd\u3092\u62e1\u5f35\u3057\u3066\u3044\u308bXray\u306e\u6700\u65b0\u306e\u6a5f\u80fd\u5f37\u5316\u306b\u904e\u304e\u307e\u305b\u3093\u3002Xray\u3068JFrog Platform\u306eDevSecOps\u5411\u3051\u6a5f\u80fd\u306b\u95a2\u3059\u308b\u91cd\u8981\u306a\u767a\u8868\u306b\u3054\u671f\u5f85\u304f\u3060\u3055\u3044\u3002<\/span><\/p>\n<p><img decoding=\"async\" class=\"alignnone wp-image-75122\" src=\"https:\/\/media.jfrog.com\/wp-content\/uploads\/2021\/05\/11170751\/Logo-Red_Hat-Certified_Technology-Vulnerability_Scanner-A-Standard-RGB-863-width.png\" alt=\"\" width=\"503\" height=\"322\" srcset=\"https:\/\/speedmedia2.jfrog.com\/08612fe1-9391-4cf3-ac1a-6dd49c36b276\/media.jfrog.com\/wp-content\/uploads\/2021\/05\/11170751\/Logo-Red_Hat-Certified_Technology-Vulnerability_Scanner-A-Standard-RGB-863-width.png?speedsize=w_863 863w, https:\/\/speedmedia2.jfrog.com\/08612fe1-9391-4cf3-ac1a-6dd49c36b276\/media.jfrog.com\/wp-content\/uploads\/2021\/05\/11170751\/Logo-Red_Hat-Certified_Technology-Vulnerability_Scanner-A-Standard-RGB-863-width.png?speedsize=w_300 300w, https:\/\/speedmedia2.jfrog.com\/08612fe1-9391-4cf3-ac1a-6dd49c36b276\/media.jfrog.com\/wp-content\/uploads\/2021\/05\/11170751\/Logo-Red_Hat-Certified_Technology-Vulnerability_Scanner-A-Standard-RGB-863-width.png?speedsize=w_768 768w\" sizes=\"(max-width: 503px) 100vw, 503px\" \/><\/p>\n","protected":false},"excerpt":{"rendered":"<p>JFrog DevOps Platform\u306e\u54c1\u8cea\u3068\u6a5f\u80fd\u3092\u5411\u4e0a\u3059\u308b\u305f\u3081\u3001\u7279\u306bDevSecOps\u306e\u4e16\u754c\u3067\u306f\u53d7\u8cde\u6b74\u306e &hellip;<\/p>\n","protected":false},"author":378,"featured_media":75116,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"inline_featured_image":false,"footnotes":""},"categories":[10309,9834,9833,9395],"tags":[9611,9612,9613,9570],"class_list":["post-84293","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-community-ja","category-news-releases-ja","category-security-and-devsecops-ja","category-xray-ja-2","tag-9611","tag-9612","tag-xray-ja","tag-devsecops-ja"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v22.6 (Yoast SEO v22.6) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>JFrog Xray SCA\u30bd\u30ea\u30e5\u30fc\u30b7\u30e7\u30f3\u306eDevSecOps\u6a5f\u80fd\u3092\u5f37\u5316<\/title>\n<meta name=\"description\" content=\"JFrog Xray\u304cC\/C++\u3068Conan\u306e\u30b9\u30ad\u30e3\u30f3\u3068CVSS v3\u3092\u30b5\u30dd\u30fc\u30c8\u3057\u3001RedHat\u306e\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u8a8d\u8a3c\u3092\u53d6\u5f97\u3057\u307e\u3057\u305f\u3002Xray\u306fOSS\u30bd\u30d5\u30c8\u30a6\u30a7\u30a2\u306e\u8106\u5f31\u6027\u3068\u30e9\u30a4\u30bb\u30f3\u30b9\u306e\u30b3\u30f3\u30d7\u30e9\u30a4\u30a2\u30f3\u30b9\u9055\u53cd\u3092\u691c\u51fa\u3057\u307e\u3059\u3002\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/jfrog.com\/ja\/wp-json\/wp\/v2\/posts\/84293\" \/>\n<meta property=\"og:locale\" content=\"ja_JP\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"JFrog Xray\u3068DevSecOps\u306e\u65b0\u6a5f\u80fd\u306b\u3064\u3044\u3066\" \/>\n<meta property=\"og:description\" content=\"JFrog Xray\u304cC\/C++\u3068Conan\u306e\u30b9\u30ad\u30e3\u30f3\u3068CVSS v3\u3092\u30b5\u30dd\u30fc\u30c8\u3057\u3001RedHat\u306e\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u8a8d\u8a3c\u3092\u53d6\u5f97\u3057\u307e\u3057\u305f\u3002Xray\u306fOSS\u30bd\u30d5\u30c8\u30a6\u30a7\u30a2\u306e\u8106\u5f31\u6027\u3068\u30e9\u30a4\u30bb\u30f3\u30b9\u306e\u30b3\u30f3\u30d7\u30e9\u30a4\u30a2\u30f3\u30b9\u9055\u53cd\u3092\u691c\u51fa\u3057\u307e\u3059\u3002\" \/>\n<meta property=\"og:url\" content=\"https:\/\/jfrog.com\/ja\/blog\/whats-new-with-jfrog-xray-and-devsecops\/\" \/>\n<meta property=\"og:site_name\" content=\"JFrog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/artifrog\" \/>\n<meta property=\"article:published_time\" content=\"2021-05-17T22:00:19+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-11-18T16:15:36+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/speedmedia.jfrog.com\/08612fe1-9391-4cf3-ac1a-6dd49c36b276\/https:\/\/media.jfrog.com\/wp-content\/uploads\/2021\/05\/11170730\/203x148-2.png\" \/>\n\t<meta property=\"og:image:width\" content=\"203\" \/>\n\t<meta property=\"og:image:height\" content=\"148\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"iwashitah\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@jfrog\" \/>\n<meta name=\"twitter:site\" content=\"@jfrog\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"iwashitah\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/jfrog.com\/ja\/blog\/whats-new-with-jfrog-xray-and-devsecops\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/jfrog.com\/ja\/blog\/whats-new-with-jfrog-xray-and-devsecops\/\"},\"author\":{\"name\":\"iwashitah\",\"@id\":\"https:\/\/jfrog.com\/ja\/#\/schema\/person\/17e600b868dca262dc088af9b8db4a74\"},\"headline\":\"JFrog Xray\u3068DevSecOps\u306e\u65b0\u6a5f\u80fd\u306b\u3064\u3044\u3066\",\"datePublished\":\"2021-05-17T22:00:19+00:00\",\"dateModified\":\"2021-11-18T16:15:36+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/jfrog.com\/ja\/blog\/whats-new-with-jfrog-xray-and-devsecops\/\"},\"wordCount\":126,\"publisher\":{\"@id\":\"https:\/\/jfrog.com\/ja\/#organization\"},\"image\":{\"@id\":\"https:\/\/jfrog.com\/ja\/blog\/whats-new-with-jfrog-xray-and-devsecops\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/speedmedia2.jfrog.com\/08612fe1-9391-4cf3-ac1a-6dd49c36b276\/media.jfrog.com\/wp-content\/uploads\/2021\/05\/11170730\/203x148-2.png\",\"keywords\":[\"\u30bd\u30d5\u30c8\u30a6\u30a7\u30a2\u69cb\u6210\u5206\u6790\",\"\u30e6\u30cb\u30d0\u30fc\u30b5\u30eb\u30fb\u30ea\u30dd\u30b8\u30c8\u30ea\u30fb\u30de\u30cd\u30fc\u30b8\u30e3\",\"Xray\",\"DevSecOps\"],\"articleSection\":[\"Community\",\"News &amp; Releases\",\"Security and DevSecOps\",\"Xray\"],\"inLanguage\":\"ja\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/jfrog.com\/ja\/blog\/whats-new-with-jfrog-xray-and-devsecops\/\",\"url\":\"https:\/\/jfrog.com\/ja\/blog\/whats-new-with-jfrog-xray-and-devsecops\/\",\"name\":\"JFrog Xray SCA\u30bd\u30ea\u30e5\u30fc\u30b7\u30e7\u30f3\u306eDevSecOps\u6a5f\u80fd\u3092\u5f37\u5316\",\"isPartOf\":{\"@id\":\"https:\/\/jfrog.com\/ja\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/jfrog.com\/ja\/blog\/whats-new-with-jfrog-xray-and-devsecops\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/jfrog.com\/ja\/blog\/whats-new-with-jfrog-xray-and-devsecops\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/speedmedia2.jfrog.com\/08612fe1-9391-4cf3-ac1a-6dd49c36b276\/media.jfrog.com\/wp-content\/uploads\/2021\/05\/11170730\/203x148-2.png\",\"datePublished\":\"2021-05-17T22:00:19+00:00\",\"dateModified\":\"2021-11-18T16:15:36+00:00\",\"description\":\"JFrog Xray\u304cC\/C++\u3068Conan\u306e\u30b9\u30ad\u30e3\u30f3\u3068CVSS v3\u3092\u30b5\u30dd\u30fc\u30c8\u3057\u3001RedHat\u306e\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u8a8d\u8a3c\u3092\u53d6\u5f97\u3057\u307e\u3057\u305f\u3002Xray\u306fOSS\u30bd\u30d5\u30c8\u30a6\u30a7\u30a2\u306e\u8106\u5f31\u6027\u3068\u30e9\u30a4\u30bb\u30f3\u30b9\u306e\u30b3\u30f3\u30d7\u30e9\u30a4\u30a2\u30f3\u30b9\u9055\u53cd\u3092\u691c\u51fa\u3057\u307e\u3059\u3002\",\"breadcrumb\":{\"@id\":\"https:\/\/jfrog.com\/ja\/blog\/whats-new-with-jfrog-xray-and-devsecops\/#breadcrumb\"},\"inLanguage\":\"ja\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/jfrog.com\/ja\/blog\/whats-new-with-jfrog-xray-and-devsecops\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"ja\",\"@id\":\"https:\/\/jfrog.com\/ja\/blog\/whats-new-with-jfrog-xray-and-devsecops\/#primaryimage\",\"url\":\"https:\/\/speedmedia2.jfrog.com\/08612fe1-9391-4cf3-ac1a-6dd49c36b276\/media.jfrog.com\/wp-content\/uploads\/2021\/05\/11170730\/203x148-2.png\",\"contentUrl\":\"https:\/\/speedmedia2.jfrog.com\/08612fe1-9391-4cf3-ac1a-6dd49c36b276\/media.jfrog.com\/wp-content\/uploads\/2021\/05\/11170730\/203x148-2.png\",\"width\":203,\"height\":148},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/jfrog.com\/ja\/blog\/whats-new-with-jfrog-xray-and-devsecops\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/jfrog.com\/ja\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"JFrog Xray\u3068DevSecOps\u306e\u65b0\u6a5f\u80fd\u306b\u3064\u3044\u3066\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/jfrog.com\/ja\/#website\",\"url\":\"https:\/\/jfrog.com\/ja\/\",\"name\":\"JFrog\",\"description\":\"Deliver Trusted Software Releases at Speed and Scale\",\"publisher\":{\"@id\":\"https:\/\/jfrog.com\/ja\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/jfrog.com\/ja\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"ja\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/jfrog.com\/ja\/#organization\",\"name\":\"JFrog\",\"url\":\"https:\/\/jfrog.com\/ja\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"ja\",\"@id\":\"https:\/\/jfrog.com\/ja\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/speedmedia2.jfrog.com\/08612fe1-9391-4cf3-ac1a-6dd49c36b276\/media.jfrog.com\/wp-content\/uploads\/2025\/05\/27095207\/Logo.svg\",\"contentUrl\":\"https:\/\/speedmedia2.jfrog.com\/08612fe1-9391-4cf3-ac1a-6dd49c36b276\/media.jfrog.com\/wp-content\/uploads\/2025\/05\/27095207\/Logo.svg\",\"width\":74,\"height\":73,\"caption\":\"JFrog\"},\"image\":{\"@id\":\"https:\/\/jfrog.com\/ja\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/artifrog\",\"https:\/\/x.com\/jfrog\",\"https:\/\/www.linkedin.com\/company\/455737\",\"https:\/\/www.youtube.com\/channel\/UCh2hNg76zo3d1qQqTWIQxDg\",\"https:\/\/www.wikidata.org\/wiki\/Q98608948\"],\"description\":\"We set out on our Liquid Software journey in 2008, with the mission to transform the way enterprises manage and release software updates. The world expects software to update continuously, securely, non-intrusively and without user intervention. This hyper-connected experience can only be enabled by automation with an end-to-end DevOps platform and a binary-centric focus. With this in mind, we\u2019ve developed the JFrog Platform, ushering in a new era of DevOps and DevSecOps standards that power continuous updates. More than a decade after our founding, with thousands of customers and millions of users globally, JFrog has become the \u201cDatabase of DevOps\u201d and the de-facto standard in release and update management.\",\"legalName\":\"Jfrog, Inc.\",\"numberOfEmployees\":{\"@type\":\"QuantitativeValue\",\"minValue\":\"1001\",\"maxValue\":\"5000\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/jfrog.com\/ja\/#\/schema\/person\/17e600b868dca262dc088af9b8db4a74\",\"name\":\"iwashitah\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"ja\",\"@id\":\"https:\/\/jfrog.com\/ja\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/7f61dea9b652c0298848306182008db3b9602dd7805c27d27a2b3bc8a09cef92?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/7f61dea9b652c0298848306182008db3b9602dd7805c27d27a2b3bc8a09cef92?s=96&d=mm&r=g\",\"caption\":\"iwashitah\"}}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"JFrog Xray SCA\u30bd\u30ea\u30e5\u30fc\u30b7\u30e7\u30f3\u306eDevSecOps\u6a5f\u80fd\u3092\u5f37\u5316","description":"JFrog Xray\u304cC\/C++\u3068Conan\u306e\u30b9\u30ad\u30e3\u30f3\u3068CVSS v3\u3092\u30b5\u30dd\u30fc\u30c8\u3057\u3001RedHat\u306e\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u8a8d\u8a3c\u3092\u53d6\u5f97\u3057\u307e\u3057\u305f\u3002Xray\u306fOSS\u30bd\u30d5\u30c8\u30a6\u30a7\u30a2\u306e\u8106\u5f31\u6027\u3068\u30e9\u30a4\u30bb\u30f3\u30b9\u306e\u30b3\u30f3\u30d7\u30e9\u30a4\u30a2\u30f3\u30b9\u9055\u53cd\u3092\u691c\u51fa\u3057\u307e\u3059\u3002","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/jfrog.com\/ja\/wp-json\/wp\/v2\/posts\/84293","og_locale":"ja_JP","og_type":"article","og_title":"JFrog Xray\u3068DevSecOps\u306e\u65b0\u6a5f\u80fd\u306b\u3064\u3044\u3066","og_description":"JFrog Xray\u304cC\/C++\u3068Conan\u306e\u30b9\u30ad\u30e3\u30f3\u3068CVSS v3\u3092\u30b5\u30dd\u30fc\u30c8\u3057\u3001RedHat\u306e\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u8a8d\u8a3c\u3092\u53d6\u5f97\u3057\u307e\u3057\u305f\u3002Xray\u306fOSS\u30bd\u30d5\u30c8\u30a6\u30a7\u30a2\u306e\u8106\u5f31\u6027\u3068\u30e9\u30a4\u30bb\u30f3\u30b9\u306e\u30b3\u30f3\u30d7\u30e9\u30a4\u30a2\u30f3\u30b9\u9055\u53cd\u3092\u691c\u51fa\u3057\u307e\u3059\u3002","og_url":"https:\/\/jfrog.com\/ja\/blog\/whats-new-with-jfrog-xray-and-devsecops\/","og_site_name":"JFrog","article_publisher":"https:\/\/www.facebook.com\/artifrog","article_published_time":"2021-05-17T22:00:19+00:00","article_modified_time":"2021-11-18T16:15:36+00:00","og_image":[{"width":203,"height":148,"url":"https:\/\/speedmedia.jfrog.com\/08612fe1-9391-4cf3-ac1a-6dd49c36b276\/https:\/\/media.jfrog.com\/wp-content\/uploads\/2021\/05\/11170730\/203x148-2.png","type":"image\/png"}],"author":"iwashitah","twitter_card":"summary_large_image","twitter_creator":"@jfrog","twitter_site":"@jfrog","twitter_misc":{"Written by":"iwashitah","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/jfrog.com\/ja\/blog\/whats-new-with-jfrog-xray-and-devsecops\/#article","isPartOf":{"@id":"https:\/\/jfrog.com\/ja\/blog\/whats-new-with-jfrog-xray-and-devsecops\/"},"author":{"name":"iwashitah","@id":"https:\/\/jfrog.com\/ja\/#\/schema\/person\/17e600b868dca262dc088af9b8db4a74"},"headline":"JFrog Xray\u3068DevSecOps\u306e\u65b0\u6a5f\u80fd\u306b\u3064\u3044\u3066","datePublished":"2021-05-17T22:00:19+00:00","dateModified":"2021-11-18T16:15:36+00:00","mainEntityOfPage":{"@id":"https:\/\/jfrog.com\/ja\/blog\/whats-new-with-jfrog-xray-and-devsecops\/"},"wordCount":126,"publisher":{"@id":"https:\/\/jfrog.com\/ja\/#organization"},"image":{"@id":"https:\/\/jfrog.com\/ja\/blog\/whats-new-with-jfrog-xray-and-devsecops\/#primaryimage"},"thumbnailUrl":"https:\/\/speedmedia2.jfrog.com\/08612fe1-9391-4cf3-ac1a-6dd49c36b276\/media.jfrog.com\/wp-content\/uploads\/2021\/05\/11170730\/203x148-2.png","keywords":["\u30bd\u30d5\u30c8\u30a6\u30a7\u30a2\u69cb\u6210\u5206\u6790","\u30e6\u30cb\u30d0\u30fc\u30b5\u30eb\u30fb\u30ea\u30dd\u30b8\u30c8\u30ea\u30fb\u30de\u30cd\u30fc\u30b8\u30e3","Xray","DevSecOps"],"articleSection":["Community","News &amp; Releases","Security and DevSecOps","Xray"],"inLanguage":"ja"},{"@type":"WebPage","@id":"https:\/\/jfrog.com\/ja\/blog\/whats-new-with-jfrog-xray-and-devsecops\/","url":"https:\/\/jfrog.com\/ja\/blog\/whats-new-with-jfrog-xray-and-devsecops\/","name":"JFrog Xray SCA\u30bd\u30ea\u30e5\u30fc\u30b7\u30e7\u30f3\u306eDevSecOps\u6a5f\u80fd\u3092\u5f37\u5316","isPartOf":{"@id":"https:\/\/jfrog.com\/ja\/#website"},"primaryImageOfPage":{"@id":"https:\/\/jfrog.com\/ja\/blog\/whats-new-with-jfrog-xray-and-devsecops\/#primaryimage"},"image":{"@id":"https:\/\/jfrog.com\/ja\/blog\/whats-new-with-jfrog-xray-and-devsecops\/#primaryimage"},"thumbnailUrl":"https:\/\/speedmedia2.jfrog.com\/08612fe1-9391-4cf3-ac1a-6dd49c36b276\/media.jfrog.com\/wp-content\/uploads\/2021\/05\/11170730\/203x148-2.png","datePublished":"2021-05-17T22:00:19+00:00","dateModified":"2021-11-18T16:15:36+00:00","description":"JFrog Xray\u304cC\/C++\u3068Conan\u306e\u30b9\u30ad\u30e3\u30f3\u3068CVSS v3\u3092\u30b5\u30dd\u30fc\u30c8\u3057\u3001RedHat\u306e\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u8a8d\u8a3c\u3092\u53d6\u5f97\u3057\u307e\u3057\u305f\u3002Xray\u306fOSS\u30bd\u30d5\u30c8\u30a6\u30a7\u30a2\u306e\u8106\u5f31\u6027\u3068\u30e9\u30a4\u30bb\u30f3\u30b9\u306e\u30b3\u30f3\u30d7\u30e9\u30a4\u30a2\u30f3\u30b9\u9055\u53cd\u3092\u691c\u51fa\u3057\u307e\u3059\u3002","breadcrumb":{"@id":"https:\/\/jfrog.com\/ja\/blog\/whats-new-with-jfrog-xray-and-devsecops\/#breadcrumb"},"inLanguage":"ja","potentialAction":[{"@type":"ReadAction","target":["https:\/\/jfrog.com\/ja\/blog\/whats-new-with-jfrog-xray-and-devsecops\/"]}]},{"@type":"ImageObject","inLanguage":"ja","@id":"https:\/\/jfrog.com\/ja\/blog\/whats-new-with-jfrog-xray-and-devsecops\/#primaryimage","url":"https:\/\/speedmedia2.jfrog.com\/08612fe1-9391-4cf3-ac1a-6dd49c36b276\/media.jfrog.com\/wp-content\/uploads\/2021\/05\/11170730\/203x148-2.png","contentUrl":"https:\/\/speedmedia2.jfrog.com\/08612fe1-9391-4cf3-ac1a-6dd49c36b276\/media.jfrog.com\/wp-content\/uploads\/2021\/05\/11170730\/203x148-2.png","width":203,"height":148},{"@type":"BreadcrumbList","@id":"https:\/\/jfrog.com\/ja\/blog\/whats-new-with-jfrog-xray-and-devsecops\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/jfrog.com\/ja\/"},{"@type":"ListItem","position":2,"name":"JFrog Xray\u3068DevSecOps\u306e\u65b0\u6a5f\u80fd\u306b\u3064\u3044\u3066"}]},{"@type":"WebSite","@id":"https:\/\/jfrog.com\/ja\/#website","url":"https:\/\/jfrog.com\/ja\/","name":"JFrog","description":"Deliver Trusted Software Releases at Speed and Scale","publisher":{"@id":"https:\/\/jfrog.com\/ja\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/jfrog.com\/ja\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"ja"},{"@type":"Organization","@id":"https:\/\/jfrog.com\/ja\/#organization","name":"JFrog","url":"https:\/\/jfrog.com\/ja\/","logo":{"@type":"ImageObject","inLanguage":"ja","@id":"https:\/\/jfrog.com\/ja\/#\/schema\/logo\/image\/","url":"https:\/\/speedmedia2.jfrog.com\/08612fe1-9391-4cf3-ac1a-6dd49c36b276\/media.jfrog.com\/wp-content\/uploads\/2025\/05\/27095207\/Logo.svg","contentUrl":"https:\/\/speedmedia2.jfrog.com\/08612fe1-9391-4cf3-ac1a-6dd49c36b276\/media.jfrog.com\/wp-content\/uploads\/2025\/05\/27095207\/Logo.svg","width":74,"height":73,"caption":"JFrog"},"image":{"@id":"https:\/\/jfrog.com\/ja\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/artifrog","https:\/\/x.com\/jfrog","https:\/\/www.linkedin.com\/company\/455737","https:\/\/www.youtube.com\/channel\/UCh2hNg76zo3d1qQqTWIQxDg","https:\/\/www.wikidata.org\/wiki\/Q98608948"],"description":"We set out on our Liquid Software journey in 2008, with the mission to transform the way enterprises manage and release software updates. The world expects software to update continuously, securely, non-intrusively and without user intervention. This hyper-connected experience can only be enabled by automation with an end-to-end DevOps platform and a binary-centric focus. With this in mind, we\u2019ve developed the JFrog Platform, ushering in a new era of DevOps and DevSecOps standards that power continuous updates. More than a decade after our founding, with thousands of customers and millions of users globally, JFrog has become the \u201cDatabase of DevOps\u201d and the de-facto standard in release and update management.","legalName":"Jfrog, Inc.","numberOfEmployees":{"@type":"QuantitativeValue","minValue":"1001","maxValue":"5000"}},{"@type":"Person","@id":"https:\/\/jfrog.com\/ja\/#\/schema\/person\/17e600b868dca262dc088af9b8db4a74","name":"iwashitah","image":{"@type":"ImageObject","inLanguage":"ja","@id":"https:\/\/jfrog.com\/ja\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/7f61dea9b652c0298848306182008db3b9602dd7805c27d27a2b3bc8a09cef92?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/7f61dea9b652c0298848306182008db3b9602dd7805c27d27a2b3bc8a09cef92?s=96&d=mm&r=g","caption":"iwashitah"}}]}},"_links":{"self":[{"href":"https:\/\/jfrog.com\/ja\/wp-json\/wp\/v2\/posts\/84293","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/jfrog.com\/ja\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/jfrog.com\/ja\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/jfrog.com\/ja\/wp-json\/wp\/v2\/users\/378"}],"replies":[{"embeddable":true,"href":"https:\/\/jfrog.com\/ja\/wp-json\/wp\/v2\/comments?post=84293"}],"version-history":[{"count":2,"href":"https:\/\/jfrog.com\/ja\/wp-json\/wp\/v2\/posts\/84293\/revisions"}],"predecessor-version":[{"id":84295,"href":"https:\/\/jfrog.com\/ja\/wp-json\/wp\/v2\/posts\/84293\/revisions\/84295"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/jfrog.com\/ja\/wp-json\/wp\/v2\/media\/75116"}],"wp:attachment":[{"href":"https:\/\/jfrog.com\/ja\/wp-json\/wp\/v2\/media?parent=84293"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/jfrog.com\/ja\/wp-json\/wp\/v2\/categories?post=84293"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/jfrog.com\/ja\/wp-json\/wp\/v2\/tags?post=84293"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}