Comprehensive tools for dependency analysis and vulnerability assessment. Secure your software supply chain with advanced dependency exploration and VEX document generation.
Get started with our open-source tools today. Join the community of developers building more secure software.
Two powerful open-source tools designed to work together for comprehensive supply chain security
Constructs full dependency graphs from package manifests (npm, pip, Maven, etc.) and detects vulnerable transitive dependencies. Visualizes them in Neo4j for comprehensive analysis.
Automated tool that generates VEX (Vulnerability Exploitability eXchange) documents indicating exploitability status for software artifacts, integrating with OSV and SBOMs.
Depex and VEXGen complement each other to provide comprehensive supply chain security
Depex analyzes your project and builds comprehensive dependency graphs
Vulnerabilities are detected across all transitive dependencies
VEXGen creates standardized VEX documents for vulnerability status
Real-world applications for enhanced supply chain security
Large organizations can audit their entire software portfolio for vulnerabilities and maintain compliance documentation.
Integrate into your development pipeline for automated vulnerability scanning and VEX document generation on every build.
Maintainers can provide transparency about their project's security posture and dependency health to users.
SecureChain is proudly supported by leading research institutions committed to advancing cybersecurity
University of Seville
Leading research in software engineering, data analysis, and intelligent systems with a focus on innovative solutions for complex technological challenges.
Visit IDEA Research GroupInstitute of Computer Engineering, University of Seville
Dedicated to advancing computer engineering research and innovation, fostering collaboration between academia and industry in cutting-edge technology development.
Visit I3US InstituteThese institutions provide invaluable support through research collaboration, academic expertise, and commitment to open-source cybersecurity advancement.