SCA Overview
Software Composition Analysis (SCA) helps you identify vulnerabilities, license issues, and outdated packages in your third-party dependencies.
Getting Started with SCA
Navigate to Dashboard → SCA to access the SCA dashboard.
Running an SCA Scan
SCA scanning is included automatically in Deep Scans via the Trivy scanner. You can also trigger a standalone SCA scan:
- Go to the SCA page
- Select a repository from the dropdown
- Click Scan to trigger a new analysis
SCA Dashboard
The SCA page has six tabs:
Overview
- Vulnerability Summary — Total, Critical, High, Medium, Low counts
- Security Score — 0-100 rating of your dependency security
- License Compliance Score — 0-100 rating of license cleanliness
- Overall Health Score — Combined assessment
Vulnerabilities
A table of all dependency vulnerabilities:
| Field | Description |
|---|---|
| Title | CVE or vulnerability description |
| Severity | Critical, High, Medium, Low |
| Package | Affected dependency name and version |
| File Path | Which manifest file contains this dependency |
| Risk Score | Composite score (0-100) |
| CVSS Score | Standardized severity rating |
| Fix Available | Whether a patched version exists |
Dependencies
Complete list of your project’s dependencies:
- Package name and current version
- Latest version available
- Outdated indicator
- License type
- Package manager (npm, pip, etc.)
- Vulnerability count
Licenses
See the full license breakdown:
- Compliance score — Percentage of clean licenses
- Total packages analyzed
- Violations — Packages with incompatible licenses
- Warnings — Packages with copyleft or restrictive licenses
- Unknown — Packages with undetectable licenses
SBOM
Software Bill of Materials — see SBOM Export for details.
Settings
Per-repository SCA configuration:
- Exclude paths — Skip specific directories or file types
- Jira integration — Auto-create tickets for findings above a severity threshold
- Email notifications — Send alerts on new vulnerabilities
- Schedule — Set up recurring SCA scans (cron expression)
Upgrade Commands
When outdated vulnerable packages are found, CodeStax generates the appropriate upgrade command for your package manager:
# npm
npm install package-name@latest
# yarn
yarn upgrade package-name@latest
# pip
pip install --upgrade package-name
# poetry
poetry update package-name
# maven
# Update version in pom.xml to X.Y.Z
# cargo
cargo update -p package-name
# go
go get package-name@latestAI-Powered Suggestions
CodeStax can suggest alternative packages when a dependency has:
- Unpatched critical vulnerabilities
- Abandoned maintenance (no updates in 2+ years)
- License incompatibilities
These suggestions compare alternatives by popularity, security history, and API compatibility.