Xcheck SCA

Intelligence-Led Open Source Supply Chain Security Platform

Apply for Trial

Add a small xmirror
Answer your questions

Manage Open Source Risks in Digital Supply Chain

Xcheck SCA integrates Xmirror's pioneering code vaccine technology. It is China's first multi-mode SCA open-source governance platform that integrates six core engines: source code component analysis, code component traceability analysis, product component binary analysis, container image component scanning, runtime component dynamic tracking, and open source supply chain security intelligence early warning analysis.This multi-mode SCA governance platform rapidly scans various open-source risks in digital applications and container images, and provides real-time and accurate digital supply chain security intelligence warning capabilities.

Stones from Others Can Polish Jade or Break It

Nowadays, almost all digital applications are based on third-party components, open source code, and general function libraries for R&D efficiency considerations. What is often overlooked along with high efficiency is the outbreak of open source component risks. According to a survey Reported by industry company, an average of 283 open source libraries are used in applications, and more than 70% of applications are found to have open source component vulnerabilities during initial testing. We should not repeatedly ignore such obvious and widespread risks.

SCA, the Key to Open Source Governance

As the Entry Point for Digital Supply Chain Security Management, It Controls the Security Risks of Digital Assets in the Entire Process of Introduction, Production, Distribution and Delivery of the Digital Supply Chain.
Based on SBOM (Software Bill of Materials), Verify Material Component Consistency ,Conduct Open Source Risk Governance, and Help Establish a Devsecops Agile Security System and an SDL Secure Development System.
Combined with Supply Chain Security Intelligence, Conduct Continuous Risk Assessment of Digital Supply Chain Components and Implement Rapid Response to Vulnerability Events
Output a Transparent List of Digital Application Component Assets and Risks, and Establish a Secure and Trustworthy SBOM Library with targeted focus.

Six Typical Scenarios of Open Source Governance

Xcheck SCA is the first multi-mode SCA open source digital supply chain security review and governance platform with six core engines: source code component analysis, code component traceability analysis, product component binary analysis, container image component scanning, runtime component dynamic tracking, and open source supply chain security intelligence early warning analysis.

Technology Category Source Code SCA Code traceability SCA Binary SCA Container image SCA Runtime SCA Supply chain risk intelligence and early warning
Detection Target Using XSBOM to provide global real-time digital supply chain intelligence, SCA Automatically Comb Through Third-Party Component Assets in Digital Applications and Review Them for Known Vulnerabilities, Malicious Code, and License Compliance Risks
Detection Object Source code files:
code repositories, feature files of local source code projects, and source code files
Source code snippets:
code snippets of code bases, local source code projects, and function-level code features
Binary:
mobile applications Android/iOS, IoT firmware, embedded systems, etc
Container images:
Docker images and OCI standard images
Runtime application:
During application execution, runtime instrumentation detection technology is used to detect third-party component components loaded by the application during real operation
Source code, binaries, container images, source code fragments, runtime applications, and more
Detection Scenario Development and Testing Phase Development and Testing Phase Delivery and Procurement Phase Delivery and Procurement Phase Testing and Online Operation Phase Full supply chain stage
Core Competencies Supports a variety of detection methods: dynamic simulation of the build environment, static feature files, accurate hash matching, project structure similarity detection, and vulnerability exploit link reachability verification Supports real-time synchronization of code fingerprint databases with various open source code hosting platforms, and supports analyzing the similarity of code fragments between user code projects and open source projects, as well as whether there is a risk of AI-generated code infringement Supports rich compression formats and file format analysis, and supports risk detection of a large number of common components of vehicle systems, SDKs, and firmware Supports image hierarchical dependency graph construction, malicious components, malware detection, backdoor/escape risk detection, and sensitive information scanning Dynamic component discovery is supported, and third-party component versions are identified by monitoring the files loaded by the process. Supports the full lifecycle management of SBOM and provides high-value intelligence such as vulnerability fixes and mitigation plans, license compliance interpretation, and supply chain poisoning in real time
Detection Difficulty Medium difficulty, the source code file contains complete information, and the results are more interpretable and accurate. Among them, the technical threshold for the customer's local environment simulation construction and project structure similarity detection is high High difficulty,When developing and introducing third-party projects, the code will be refactored (such as variable renaming, logical equivalent substitution), and Source SCA uses code semantic-level feature extraction to weaken surface syntax differences and lead the detection accuracy in the industry High difficulty,The requirements for detection algorithms are higher, and it is necessary to continuously maintain and optimize the feature database, and specially expand the collection of common components, SDKs, vulnerabilities, and malware for file objects such as mobile applications and firmware High difficulty,In addition to parsing the standard metadata of image configuration files, Source SCA integrates source code dependent SCA and binary SCA through source code, and can perform in-depth detection of self-developed and customized software developed by enterprises High difficulty,Through runtime monitoring technology, third-party components can be loaded when the inspection program is running, which supports runtime reachability verification and high detection accuracy High difficulty,Through the "five analysis engines" and SBOM full-cycle management technology, the open source digital supply chain security intelligence is linked to achieve real-time risk warning at the hourly level
Technical Characteristics Source code is required, which cannot be provided by customers in some scenarios, such as software developed by vendors Source code is required, which cannot be provided by customers in some scenarios, such as software developed by vendors No source code is required, binary files can be uploaded, which is less intrusive and has little data security risk No source code is required, Upload the container image file No source code is required, and it is easy to integrate, monitor, and repair with the application Needs to be linked with digital supply chain security intelligence, and high-efficiency scenarios need to be updated online in real time
Industry value Avoid risks such as introducing vulnerabilities in the development stage, poisoning the supply chain, and licensing compliance IP compliance and supply chain transparency It meets high security requirements such as the Internet of Vehicles and the Industrial Internet of Things Secure cloud-native delivery Ensure equipment operational compliance Digital supply chain intelligence responds in a timely manner, and compliance and supply chain transparency are achieved

AI-Driven Real-Time Supply Chain Security Intelligence Alerts

Xmirror Supply Chain Security Intelligence Cloud Platform, based on precise and comprehensive Software Bill of Materials (SBOM) management and an AI-driven big data analytics engine, achieves 7×24 real-time monitoring and traceability analysis of digital supply chain security across the entire network. It intelligently pushes notifications related to digital supply chain attacks, component defects and service disruptions, and open-source license risks that are "relevant to me," ensuring a proactive approach to security.

SCA Testing Full Coverage

SBOM Software Bill of Materials

  • Component Information
  • Code Files
  • Code Snippet
  • Dependency List
  • Compatible With DSDX、SPDX、SWID、CycloneDX

Risk of Supply Chain

  • Open Source Vulnerabilities
  • Abnormal Behavior Code
  • Supply Chain Poisoning
  • Application Security Flaws

Open Source License Compliance

  • Licence Compatibility
  • Licence Compliance
  • Licence Version
  • Licence Conflicts

ITAI(Information Technology Application Innovation), Supply Chain Security Censorship

Xcheck SCA enables compliance with the supervision of trusted innovation, supports compatibility with the mainstream domestic trusted innovation environment, and ensures the security and reliability of the domestic trusted innovation industry ecosystem. It provides a one-click digital application supply chain security review service, covering the software source code, source code fingerprint, software installation package and product package of digital applications, ensuring that trusted innovation applications quickly meet relevant regulatory requirements.

Clients

The original, patented third-generation DevSecOps digital supply chain security management system, incorporating an "end-to-end digital supply chain security empowerment platform + agile security tool chain + supply chain threat intelligence services," Innovatively empowers users across various industries such as finance, connected vehicles, telecommunications, energy, government, smart manufacturing, and the broader Internet sector. This system builds a symbiotic and proactive defense framework that adapts to business elasticity, supports agile business delivery, and guides future architectural evolution, continuously safeguarding the security of china's digital supply chain.

        Partners

        Together with our partners, we are exploring a billion-dollar blue ocean market, jointly driving the implementation of DevSecOps digital supply chain security practices for enterprises, and fostering a symbiotic relationship between business growth and security.

        Comments

        Awards

        • China Top 50 Technology Companies

        • Forrester

          SCA、SAST Evaluated Vendors

        • International Data Corporation

          China DevSecOps Innovators

        • Gartner

          SCA Evaluated Vendors

        • CDM Group

          Next-Gen in Open-Source Security

        • Business Intelligence Group

          BIG Innovation Award

        • Internet Security Conference

          The Top 10 Innovators of the Year

        • China Academy of Information and Communications Technology

          Software Supply Chain Famous Achievement Cases

        Certifications

        • National high-tech enterprise

        • CNNVD compatibility certification

        • CAPPVD vulnerability library support unit

        • Intellectual Property Management System Certification

          ddd

        • Beijing Intellectual Property Pilot Unit

        • International Quality Management System Certification

          ISO9001

        • International Information Technology Service Management System

          ISO20000

        • International Information Security Management System

          ISO27001

        Threat governance from the application source, building a new generation of Digital Supply Chain Security system

        顾问小镜

        悬镜安全

        在线咨询

        CHAT WITH US

        渗透测试,漏洞扫描,AI安全
        Keywords: 渗透测试 漏洞扫描 AI安全