What do you need?
graph LR Start[What do you need?] Start —> License[License DatasetComponent Identification
& Compliance] Start —> Crypto[Cryptography Dataset
Algorithm Detection] Start —> Security[Security Dataset
Vulnerability Management] Start —> Process[Process & Integrations
CI/CD Automation] style Start fill:#4A90E2,stroke:#2E5C8A,stroke-width:3px,color:#fff style License fill:#66BB6A,stroke:#43A047,stroke-width:2px,color:#fff style Crypto fill:#AB47BC,stroke:#8E24AA,stroke-width:2px,color:#fff style Security fill:#EF5350,stroke:#E53935,stroke-width:2px,color:#fff style Process fill:#26A69A,stroke:#00897B,stroke-width:2px,color:#fff
License Dataset
graph TD LicenseStart[License DatasetWhat do you need?] LicenseStart —> Snippet[Detect Undeclared Code
& Snippets] LicenseStart —> SBOM[Generate Software
Bill of Materials] LicenseStart —> Config[Configure Scanning
Behavior] %% Snippet Detection Branch subgraph SnippetTools[“Snippet Detection Tools”] direction LR PreCommit[Pre-Commit Hooks] PY_Snippet[SCANOSS-PY] CC_Snippet[SCANOSS-CC] GHA_Snippet[GitHub Actions] end Snippet —> SnippetTools %% SBOM Creation Branch subgraph SBOMTools[“SBOM Creation Tools”] direction LR PY_SBOM[SCANOSS-PY] Workbench[SBOM Workbench] GHA_SBOM[GitHub Actions] end SBOM —> SBOMTools %% Configuration Branch subgraph ConfigTools[“Configuration Options”] direction LR Settings[SCANOSS Settings] Context[Product Context
Dependency] end Config —> ConfigTools style LicenseStart fill:#66BB6A,stroke:#43A047,stroke-width:3px,color:#fff style Snippet fill:#81C784,stroke:#66BB6A,stroke-width:2px,color:#fff style SBOM fill:#81C784,stroke:#66BB6A,stroke-width:2px,color:#fff style Config fill:#81C784,stroke:#66BB6A,stroke-width:2px,color:#fff style SnippetTools fill:#C8E6C9,stroke:#81C784,stroke-width:2px,color:#000 style SBOMTools fill:#C8E6C9,stroke:#81C784,stroke-width:2px,color:#000 style ConfigTools fill:#C8E6C9,stroke:#81C784,stroke-width:2px,color:#000 style PreCommit fill:#A5D6A7,stroke:#81C784,stroke-width:2px,color:#000 style PY_Snippet fill:#A5D6A7,stroke:#81C784,stroke-width:2px,color:#000 style CC_Snippet fill:#A5D6A7,stroke:#81C784,stroke-width:2px,color:#000 style GHA_Snippet fill:#A5D6A7,stroke:#81C784,stroke-width:2px,color:#000 style PY_SBOM fill:#A5D6A7,stroke:#81C784,stroke-width:2px,color:#000 style Workbench fill:#A5D6A7,stroke:#81C784,stroke-width:2px,color:#000 style GHA_SBOM fill:#A5D6A7,stroke:#81C784,stroke-width:2px,color:#000 style Settings fill:#A5D6A7,stroke:#81C784,stroke-width:2px,color:#000 style Context fill:#A5D6A7,stroke:#81C784,stroke-width:2px,color:#000
Cryptography Dataset
graph TD CryptoStart[Cryptography DatasetFind Cryptographic Algorithms] CryptoStart —> Purpose[What do you need?] Purpose —> API[Direct API Queries] Purpose —> CLI[Command Line Scanning] Purpose —> Visual[Visual Analysis] subgraph CryptoTools[“Available Tools”] direction LR CryptoAPI[SCANOSS API] CryptoPY[SCANOSS-PY] CryptoWorkbench[SBOM Workbench] end API —> CryptoAPI CLI —> CryptoPY Visual —> CryptoWorkbench style CryptoStart fill:#AB47BC,stroke:#8E24AA,stroke-width:3px,color:#fff style Purpose fill:#BA68C8,stroke:#AB47BC,stroke-width:2px,color:#fff style API fill:#CE93D8,stroke:#BA68C8,stroke-width:2px,color:#fff style CLI fill:#CE93D8,stroke:#BA68C8,stroke-width:2px,color:#fff style Visual fill:#CE93D8,stroke:#BA68C8,stroke-width:2px,color:#fff style CryptoTools fill:#F3E5F5,stroke:#AB47BC,stroke-width:2px,color:#000 style CryptoAPI fill:#E1BEE7,stroke:#CE93D8,stroke-width:2px,color:#000 style CryptoPY fill:#E1BEE7,stroke:#CE93D8,stroke-width:2px,color:#000 style CryptoWorkbench fill:#E1BEE7,stroke:#CE93D8,stroke-width:2px,color:#000
Security Dataset
graph TD SecurityStart[Security DatasetIdentify Vulnerabilities & CVEs] SecurityStart —> Purpose[What do you need?] Purpose —> API[Direct API Queries] Purpose —> CLI[Command Line Scanning] Purpose —> Visual[Visual Analysis] subgraph SecurityTools[“Available Tools”] direction LR SecurityAPI[SCANOSS API] SecurityPY[SCANOSS-PY] SecurityWorkbench[SBOM Workbench] end API —> SecurityAPI CLI —> SecurityPY Visual —> SecurityWorkbench style SecurityStart fill:#EF5350,stroke:#E53935,stroke-width:3px,color:#fff style Purpose fill:#E57373,stroke:#EF5350,stroke-width:2px,color:#fff style API fill:#EF9A9A,stroke:#E57373,stroke-width:2px,color:#fff style CLI fill:#EF9A9A,stroke:#E57373,stroke-width:2px,color:#fff style Visual fill:#EF9A9A,stroke:#E57373,stroke-width:2px,color:#fff style SecurityTools fill:#FFEBEE,stroke:#EF5350,stroke-width:2px,color:#000 style SecurityAPI fill:#FFCDD2,stroke:#EF9A9A,stroke-width:2px,color:#000 style SecurityPY fill:#FFCDD2,stroke:#EF9A9A,stroke-width:2px,color:#000 style SecurityWorkbench fill:#FFCDD2,stroke:#EF9A9A,stroke-width:2px,color:#000
Process & Integrations
graph TD ProcessStart[Process & IntegrationsAutomate & Monitor] ProcessStart —> Purpose[What do you need?] Purpose —> CICD[CI/CD Pipeline] Purpose —> Monitor[Continuous Monitoring] Purpose —> Reports[Compliance Reports] subgraph ProcessTools[“Available Integrations”] direction LR GHA[GitHub Actions] DT[Dependency Track] ORT[ORT Integration] end CICD —> GHA Monitor —> DT Reports —> ORT style ProcessStart fill:#26A69A,stroke:#00897B,stroke-width:3px,color:#fff style Purpose fill:#4DB6AC,stroke:#26A69A,stroke-width:2px,color:#fff style CICD fill:#80CBC4,stroke:#4DB6AC,stroke-width:2px,color:#fff style Monitor fill:#80CBC4,stroke:#4DB6AC,stroke-width:2px,color:#fff style Reports fill:#80CBC4,stroke:#4DB6AC,stroke-width:2px,color:#fff style ProcessTools fill:#E0F2F1,stroke:#26A69A,stroke-width:2px,color:#000 style GHA fill:#B2DFDB,stroke:#80CBC4,stroke-width:2px,color:#000 style DT fill:#B2DFDB,stroke:#80CBC4,stroke-width:2px,color:#000 style ORT fill:#B2DFDB,stroke:#80CBC4,stroke-width:2px,color:#000