The Open Source Analysis report can be viewed by clicking on the Open Report  icon in the CxOSA Project view (top right) regardless of which tab you are currently viewing.

The Open Source Analysis Report indicates the scan origin from which the the analysis was performed. Also includes the time/date stamp indicating the date and time of the last analysis. 

Security

Security panel provides information about the distribution of security issues for the project and is divided into the following major categories:

Vulnerability Risk

The maximum security severity across all security vulnerabilities found - High, Medium or Low

Vulnerable Libraries

Distribution of the vulnerable libraries:

No Known Vulnerable Libraries

Number of libraries without any known security vulnerabilities.

Library Severity Distribution

Distribution of the vulnerable libraries by severity. Indicates the number of libraries that have at least one security vulnerability with severity - High, medium or Low.

Aging Vulnerable Libraries

Distribution of vulnerable libraries by timeline:

Security Vulnerabilities

The Security Vulnerabilities panel provides a list of security vulnerabilities ordered by vulnerability score. The number in parenthesis is the number of vulnerabilities.

The Security Vulnerabilities list includes the following information:

In some cases the CVE reference is not provided for security vulnerabilities. The vulnerability database is based on data from multiple official sources like NVD, Node Security etc. CxOSA detects vulnerabilities by searching the database and only displays a detection if there is a match for specific components or sub-components. This procedure eliminates "false-positive" detection and ensures that the user is only provided with the most accurate and reliable information. Not all security vulnerabilities have a specific CVE reference ID. In these cases we use our own internal identifier.

License Risk and Compliance

The License Risk and Compliance panel provides the distribution of project’s open source libraries by type of license and the level of risk associated with each license.

Libraries Severity Distribution

Distribution of project’s open source libraries by severity

Libraries Severity Details

Distribution of project’s open source libraries by type of license, level of risk and occurrence:

Outdated Libraries

A list of outdated libraries with recommendations regarding newer versions available.

The Outdated Libraries list includes the following information:

Possible values are:

Filename Match - with confidence level 70%

Exact Match - with confidence level 100%

High-Medium Risk Licenses

A list of libraries with high or medium risk licenses, ordered by license risk score.

The High- Medium Risk Licenses list includes the following information:

Policy Violations

A list of policy violated libraries with policy violation, the rule that triggered the policy violation and the policy violation date.

The Policy Violations list includes the following information:

Inventory Libraries

A list of the libraries names and their licenses.

The Inventory list includes the following information:

Possible values are:

Filename Match - with confidence level 70%

Exact Match - with confidence level 100%

If an inventory is marked as "Requires Review", it simply means that the automatic analysis process wasn't able to assign a license to the library. The main reasons for this could be:

  • The file extension is not supported
  • The original open source file was modified and the SHA-1 was changed
  • The file is in-house
  • The file is not in the database and needs to be added
  • The file is not in the database and is not open source (commercial).

Best practice, in this case, is to perform a manual review (please contact Checkmarx support)






Read more: