9/12 free views
Tool
CLI
Vulnerability Management

DependencyCheck

by dependency-check

7.4Kstars
1.4Kforks
176watchers
Updated 3 months ago
About

Dependency-Check is a software composition analysis tool that identifies publicly disclosed vulnerabilities in project dependencies by mapping them to known CVEs.

OWASP dependency-check is a software composition analysis utility that detects publicly disclosed vulnerabilities in application dependencies.

Primary Use Case

This tool is primarily used by developers, security engineers, and DevSecOps teams to automatically scan application dependencies for known vulnerabilities, helping to manage and reduce risk in software supply chains. It integrates into build pipelines to provide continuous vulnerability detection and reporting.

Key Features
  • Detects publicly disclosed vulnerabilities in dependencies using CPE identifiers
  • Generates detailed reports linking dependencies to CVE entries
  • Supports integration with Maven, Gradle, CLI, and Ant build tools
  • Uses the NVD API for up-to-date vulnerability data
  • Supports local H2 database for caching vulnerability data
  • Provides automation-friendly features for DevSecOps pipelines
  • Open source with Apache 2.0 license
  • Recognized and presented at multiple Black Hat Arsenal events

Installation

  • Ensure Java 11 or higher is installed (required from version 11.0.0 onward)
  • Download production binary releases from the official GitHub pages
  • For Maven users, add the dependency-check-maven plugin to your project
  • For Gradle users, apply the dependency-check plugin in your build script
  • For CLI usage, download and run the dependency-check.sh script
  • Optionally, purge local H2 database cache with commands like './gradlew dependencyCheckPurge', 'mvn org.owasp:dependency-check-maven:9.0.0:purge', or 'dependency-check.sh --purge' if upgrading or encountering issues

Usage

>_ ./dependency-check.sh --purge

Purges the local H2 database cache to force a full NVD data download.

>_ ./dependency-check.sh --scan <path>

Scans the specified project directory for vulnerable dependencies.

>_ mvn org.owasp:dependency-check-maven:check

Runs the Dependency-Check scan within a Maven build.

>_ ./gradlew dependencyCheckAnalyze

Executes the dependency-check analysis task in a Gradle build.

Security Frameworks
Reconnaissance
Resource Development
Initial Access
Defense Evasion
Discovery
Usage Insights
  • Integrate Dependency-Check into CI/CD pipelines for continuous vulnerability detection in dependencies.
  • Combine with static application security testing (SAST) tools to enhance overall code security posture.
  • Use reports to prioritize patching and remediation efforts based on CVE severity and exploitability.
  • Leverage automation features to trigger alerts or block builds when high-risk vulnerabilities are detected.
  • Extend tool capabilities by integrating with internal vulnerability management and ticketing systems.

Docs Take 2 Hours. AI Takes 10 Seconds.

Ask anything about DependencyCheck. Installation? Config? Troubleshooting? Get answers trained on real docs and GitHub issues—not generic ChatGPT fluff.

3 free chats per tool • Instant responses • No credit card

Security Profile
Red Team70%
Blue Team80%
Purple Team75%
Details
LicenseApache License 2.0
LanguageJava
Open Issues5265
Topics
security-audit
build-tool
maven-plugin
jenkins-plugin
gradle-plugin
vulnerability-detection
security
ant-task
software-composition-analysis