Features and Capabilities

Software Composition Analysis (SCA)

Xray’s Software Composition Analysis (SCA) capabilities analyze third-party components to identify and manage different types of risk throughout the SDLC.

Security Risk

Identifies vulnerabilities, malicious behavior, and emerging threats in open-source packages and dependencies.

Capabilities include:

  • JFrog Security Research – Continuously updated threat intelligence that identifies known and emerging supply chain threats.
  • Malicious Package Detection – Detects packages that exhibit suspicious or harmful behavior beyond known CVEs.
  • Detect Malicious AI Models – Identifies potentially harmful AI and machine learning models sourced from external repositories.
  • Vulnerability Detection (CVEs) – Identifies known vulnerabilities across supported ecosystems.

→ Learn more:

JFrog Security Research

Malicious Package Detection

Detect Malicious AI Models

Legal Risk

Analyzes open-source licenses to help organizations meet legal, compliance, and distribution requirements.

Capabilities include:

  • Custom Software Licenses – Define and manage custom or proprietary licenses.
  • License Conclusion – Determine the effective license of a component based on its contents.
  • License Attribution Report – Generate attribution reports for compliance and redistribution.

→ Learn more:

Custom Software Licenses

License Conclusion

License Attribution Report

Operational Risk

Helps you identify non-security risks that can impact reliability, maintainability, and long-term support—such as end-of-life (EOL), deprecated, or unmaintained dependencies.

Capabilities include:

  • Operational Risk Analysis – Detect operational risks in repositories, builds, and release bundles based on package health and lifecycle signals. JFrog
  • EOL and Deprecation Detection – Flag components that reached end-of-life or are marked as deprecated. JFrog
  • Maintenance and Community Health Indicators – Identify components that haven’t been updated in a long time or show low maintainer activity. JFrog
  • High-Impact Updates Awareness – Highlight major version changes that may introduce breaking changes or compatibility risks. JFrog
  • Operational Risk Policies and Violations – Create an operational risk policy, attach it to a watch, and review operational risk data and violations in the scan results workflow

→ Learn more:

Operational Risk

SBOM and Supply Chain Visibility

Provides insight into the components that make up your software and how risk propagates across artifacts and builds.

Capabilities include:

  • SBOM Generation and Analysis
  • SBOM Export and Sharing
  • Component and Dependency Relationships

→ Learn more:

SBOM

SBOM Export

SBOM Import

Policies, Watches, and Enforcement

Enable governance and automated response to detected risks across the platform.

Capabilities include:

  • Policies in JFrog Xray – Define rules for security, legal, and operational risk.
  • Watches – Scope policies to specific repositories, builds, or artifacts.
  • Violations Handling and Notifications – Track, notify, and respond to policy violations.
  • Ignoring Violations (Ignore Rules) – Manage known or accepted risks.

→ Learn more:

Policies in JFrog Xray

Watches in JFrog Xray

Violations Handling and Notifications

Ignoring Violations in JFrog Xray: Understanding Ignore Rules

Reporting and Analysis

Provides multiple ways to analyze, consume, and export Xray scan results.

Capabilities include:

  • Xray Reports
  • Understanding and Analyzing Xray Scan Results
  • Exporting Scan Results

→ Learn more:

Xray Reports

Understanding and Analyzing Xray Scan Results