{"id":31769939,"url":"https://github.com/jfrog/jfrog-security-docs","last_synced_at":"2025-10-10T02:55:49.875Z","repository":{"id":266344346,"uuid":"897369408","full_name":"jfrog/jfrog-security-docs","owner":"jfrog","description":null,"archived":false,"fork":false,"pushed_at":"2025-10-05T06:59:27.000Z","size":19499,"stargazers_count":2,"open_issues_count":0,"forks_count":2,"subscribers_count":3,"default_branch":"main","last_synced_at":"2025-10-05T08:37:32.886Z","etag":null,"topics":[],"latest_commit_sha":null,"homepage":null,"language":"CSS","has_issues":true,"has_wiki":null,"has_pages":null,"mirror_url":null,"source_name":null,"license":null,"status":null,"scm":"git","pull_requests_enabled":true,"icon_url":"https://github.com/jfrog.png","metadata":{"files":{"readme":"README.md","changelog":null,"contributing":null,"funding":null,"license":null,"code_of_conduct":null,"threat_model":null,"audit":null,"citation":null,"codeowners":null,"security":null,"support":null,"governance":null,"roadmap":null,"authors":null,"dei":null,"publiccode":null,"codemeta":null,"zenodo":null,"notice":null,"maintainers":null,"copyright":null,"agents":null,"dco":null,"cla":null}},"created_at":"2024-12-02T14:11:09.000Z","updated_at":"2025-10-05T06:59:31.000Z","dependencies_parsed_at":"2024-12-18T20:20:05.543Z","dependency_job_id":"07d3e203-7e31-4d7e-abd4-7c0ce6b73895","html_url":"https://github.com/jfrog/jfrog-security-docs","commit_stats":null,"previous_names":["jfrog/jfrog-security-docs"],"tags_count":0,"template":false,"template_full_name":null,"purl":"pkg:github/jfrog/jfrog-security-docs","repository_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/jfrog%2Fjfrog-security-docs","tags_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/jfrog%2Fjfrog-security-docs/tags","releases_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/jfrog%2Fjfrog-security-docs/releases","manifests_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/jfrog%2Fjfrog-security-docs/manifests","owner_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners/jfrog","download_url":"https://codeload.github.com/jfrog/jfrog-security-docs/tar.gz/refs/heads/main","sbom_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/jfrog%2Fjfrog-security-docs/sbom","scorecard":null,"host":{"name":"GitHub","url":"https://github.com","kind":"github","repositories_count":279002527,"owners_count":26083403,"icon_url":"https://github.com/github.png","version":null,"created_at":"2022-05-30T11:31:42.601Z","updated_at":"2022-07-04T15:15:14.044Z","status":"online","status_checked_at":"2025-10-10T02:00:06.843Z","response_time":62,"last_error":null,"robots_txt_status":"success","robots_txt_updated_at":"2025-07-24T06:49:26.215Z","robots_txt_url":"https://github.com/robots.txt","online":true,"can_crawl_api":true,"host_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub","repositories_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories","repository_names_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repository_names","owners_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners"}},"keywords":[],"created_at":"2025-10-10T02:55:47.015Z","updated_at":"2025-10-10T02:55:49.870Z","avatar_url":"https://github.com/jfrog.png","language":"CSS","funding_links":[],"categories":[],"sub_categories":[],"readme":"# What is JFrog Security?\n\n### Securing the End-to-End Software Supply Chain\n\nJFrog Security provides a comprehensive solution to protect your software development lifecycle (SDLC) from emerging threats, vulnerabilities, and compliance risks. As part of JFrog’s end-to-end DevSecOps platform, JFrog Security integrates seamlessly into your development workflow, ensuring secure code, dependencies, and infrastructure from development to production.\n\n\u003cfigure\u003e\u003cimg src=\".gitbook/assets/e2e.png\" alt=\"\"\u003e\u003cfigcaption\u003e\u003c/figcaption\u003e\u003c/figure\u003e\n\n### Why JFrog Security?\n\n* **End-to-End Protection:** Security is embedded throughout the SDLC, from OSS Firewall, source code analysis, and binary analysis to runtime monitoring.\n* **Seamless Integration:** Works natively with CI/CD pipelines, package registries, and DevOps tools.\n* **Automated Security \u0026 Compliance:** Continuous scanning, risk assessment, and policy enforcement.\n\n### Key Capabilities\n\n* **JFrog Xray (SCA):** Source code and Binary analysis to detect open-source package risks (vulnerabilities, Licenses, Operational risks, and Malicious packages), with an extensive Policy engine and Reporting capabilities.\n* **JFrog Advanced Security (SAST, Secrets, CVEs contextual analysis, and IaC Security):** Source code and Binary advanced scans that go beyond SCA to expose 1st party code issues, and misconfiguration while reducing noise using CVEs contextual analysis.\n* **JFrog Curation:** Prevent risky dependencies by blocking them before they enter your Artifactory.\n* **JFrog Runtime Security:** Monitors running Kubernetes clusters for threats and integrity checks.\n","project_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2Fjfrog%2Fjfrog-security-docs","html_url":"https://awesome.ecosyste.ms/projects/github.com%2Fjfrog%2Fjfrog-security-docs","lists_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2Fjfrog%2Fjfrog-security-docs/lists"}