JFrog Xray is a universal software composition analysis (SCA) solution that natively integrates with Artifactory, giving developers and DevSecOps teams an easy way to proactively identify vulnerabilities on open source and license compliance violations, before they manifest in production releases.
Main Features and Functionality
Xray identifies security vulnerabilities and license violation as early as the dependency declaration stage and blocks builds with security issues from development. Automated and continuous governance and auditing of software artifacts and dependencies throughout the software development lifecycle from code to production.
On-Prem, Cloud, Hybrid or Multi-Cloud Solution
Xray is available on-prem (self managed) and on the cloud. Xray Cloud is hosted on your choice of Amazon Web Services, Google Cloud Platform, or Microsoft Azure, allowing you to maintain infrastructure with automated server backups, free updates and guaranteed uptime.
Deep Recursive Scanning
Xray recursively scans artifacts, builds and Release Bundles in your system, drilling down to analyze even the smallest binary component that affects your software. For example, when analyzing a Docker image, if Xray finds that it contains a Java application it will also analyze all the
.jar files used in this application.
Continuous Impact Analysis
Xray analyzes how an issue in one component affects all others in your company and displays the chain of impact in a component graph, allowing you to have a clear understanding of the impact one component has on another. It is continuously updated with new security vulnerabilities, performing an impact analysis to determine all artifacts affected by the issue.
Native Integration with Artifactory
Xray is the only security scanning tool that is natively integrated with JFrog Artifactory.
As a complementary product to JFrog Artifactory, Xray has access to the wealth of metadata Artifactory stores which, combined with deep recursive scanning, puts Xray in a unique position to analyze the relationships between binary artifacts and provide radical transparency into your component architecture to reveal the impact that a vulnerability in one component has on any other.
Xray comes with JFrog’s vulnerabilities database, to which that we continuously add new component vulnerability data. Also included is VulnDB, the industry’s most comprehensive security database to further extend the range of vulnerabilities you can scan.
Custom API-Driven Automation
Through an open REST API, Xray lets you define a custom regimen of automated analysis for all components in your system.
Scan your sources' dependencies using the JFrog CLI for vulnerabilities and licenses violations.
On-Demand Binary Scan
Point to a binary in your local file system and receive a report that contains a list of vulnerabilities and licenses for that binary using the JFrog CLI.
Universal Artifact Analysis
In line with JFrog’s universal approach, JFrog Xray performs artifact analysis for all major package formats across the CI/CD pipeline. Xray understands each package type, knows how to unpack it and what every underlying layer contains.
Xray currently supports the following package formats with new formats added regularly.
Xray scans and indexes your Go Registries, Go Modules and Go packages including recursive analysis, component graph integration and providing detailed metadata information.
|Xray recursively scans your PHP Composer packages in your registries, Zip files or Docker/Containers whether they are local or remote. Xray also checks for any dependencies in your PHP builds.|
Scan your Maven project dependencies using Xray and view vulnerabilities directly from within the IntelliJ IDE, with the JFrog IntelliJ Maven Plugin.
|Xray scans your Bower packages and performs impact analysis to keeps all components in your organization safe from any violations.|
Recursively scan the different layers of your Gradle packages and their dependencies, and use Xray's component graph to display the impact of any detected issues on your services and applications.
|Xray scans your Ivy packages and performs impact analysis to keeps all components in your organization safe from any violations.|
Recursively scan your SBT packages and identify all components in your organization that are affected by a vulnerability, and monitor components for new issues and vulnerabilities that are detected.
|Xray scans NuGet packages, recursively going through the layers of dependencies to discover issues and vulnerabilities at any depth.|
|Xray recursively opens the different layers of your Python packages and their dependencies, discovering any issues and vulnerabilities that may affect your organization.|
|Xray identifies every component contained within every layer of your Docker images. This includes identifying the packages deployed on the OS in the base image layer.|
|Xray identifies the Debian packages deployed on your Debian or Ubuntu OS that’s running on the base layer of your Docker containers. Each component is scanned for issues and vulnerabilities giving you maximum visibility into your software dependencies.|
|Xray identifies the RPM packages deployed on your RedHat or CentOS OS that’s running on the base layer of your Docker containers. Each component is scanned for issues and vulnerabilities giving you maximum visibility into your software dependencies.|
Xray provides transparency into your software architecture, recursively scanning RubyGems packages through all levels of dependency to discover issues and vulnerabilities.
Xray now scans and indexes your Alpine Repositories and Alpine Packages, including recursive analysis, component graph integration, and providing detailed metadata information.
|Xray now scans Conan Packages and Conan Builds for issues and vulnerabilities. Xray identifies these issues in the |
|Xray now scans C/C++ dependencies in C/C++ builds to identify vulnerabilities in these builds. For more information, see Conan and C/C++ Support in Xray.|
Google Distroless Images
|Xray now can scans Google Distroless Images that only contain your application and its runtime dependencies.|