SCANOSS.JSON file contains project information and BOM (Bill of Materials) rules. It allows you to include, remove or replace components in the BOM before and after scanning.
What Can You Do With It?
The settings file lets you:- Define Your Scope Control exactly which files get scanned and which don’t, saving time and processing power.
- Set Scanning Depth Choose how thoroughly you want to analyze your code, from quick scans to deep dives.
- Configure Detection Rules Fine-tune how components are identified in your codebase.
- Customise Output Format Get results that match your needs, whether it’s detailed reports or focused summaries.
- Manage Component Information Control how your software components are identified and represented.
How It Helps
- Efficiency: Skip unnecessary files and focus on what matters
- Accuracy: Guide the scanner to make better decisions
- Flexibility: Adapt the scanning process to your specific needs
- Consistency: Maintain standardized scanning across your projects
Schema Overview
Download a sample settings file here: scanoss-settings-schema.json The settings file consists of two main sections:Project Information
Theself section contains basic information about your project:
Settings
Thesettings object allows you to configure various aspects of the scanning process. It includes file filtering, network configuration, and snippet matching tuning parameters.
Settings Structure:
Skip configuration
Theskip object lets you define rules for excluding files from being scanned or fingerprinted. This can be useful for improving scan performance and avoiding unnecessary processing of certain files.
Properties
Patterns use the same syntax as .gitignore files. For more details, refer to the gitignore pattern documentation. skip.patterns.scanning: A list of file patterns to exclude from scanning.| Property | Description |
|---|---|
| Type | Array of strings |
| Required | No |
| Property | Description |
|---|---|
| Type | Array of strings |
| Required | No |
| Property | Description |
|---|---|
| Type | Object |
| Required | No |
- patterns (array of strings) — List of glob patterns to apply the min/max size rule
- min (integer) — Minimum file size in bytes
- max (integer, required) — Maximum file size in bytes
| Property | Description |
|---|---|
| Type | Object |
| Required | No |
- patterns (array of strings) — List of glob patterns to apply the min/max size rule
- min (integer) — Minimum file size in bytes
- max (integer, required) — Maximum file size in bytes
Pattern Format Rules
- Patterns are matched relative to the scan root directory
- A trailing slash indicates a directory (e.g.,
path/matches only directories) - An asterisk
*matches anything except a slash - Two asterisks
**match zero or more directories (e.g.,path/**/foldermatchespath/to,path/to/folder,path/to/folder/b) - Range notations like
[0-9]match any character in the range - Question mark
?matches any single character except a slash
Complete Skip Example
Here’s a comprehensive example combining pattern and size-based skipping.Proxy Configuration
Root-level proxy configuration for all SCANOSS API requests. This can be overridden at the snippet level usingfile_snippet.proxy.
settings.proxy
| Property | Description |
|---|---|
| Type | Object |
| Required | No |
- host (string, required) — Proxy server URL including protocol and port
HTTP Configuration
Root-level HTTP configuration for all SCANOSS API requests. This can be overridden at the snippet level usingfile_snippet.http_config.
settings.http_config
| Property | Description |
|---|---|
| Type | Object |
| Required | No |
- base_uri (string) — Base API endpoint URL
- ignore_cert_errors (boolean) — Whether to ignore SSL certificate validation errors
Snippet Matching Tuning
Thefile_snippet section provides fine-grained control over snippet matching behavior. These settings help you reduce false positives, improve match accuracy, and customise scanning behavior for your specific codebase.
file_snippet.min_snippet_hits
Minimum number of snippet hits required for a match to be considered valid. Higher values reduce false positives by requiring more evidence before reporting a match. Example:file_snippet.min_snippet_lines
Minimum number of lines a snippet must span to be considered. Filters out tiny matches that may not be meaningful, such as single-line imports or common boilerplate. Example:file_snippet.ranking_enabled
Controls whether origin project score quality is taken into account during matching. Example:file_snippet.ranking_threshold
Sets the minimum ranking score (0-10) required for matches to be reported. Higher thresholds mean only high-confidence matches are returned. Use-1 to apply the server default threshold.
Example:
file_snippet.honour_file_exts
Controls whether file extensions are considered during matching. Useful when files have been renamed or use non-standard extensions. Example:file_snippet.skip_headers
Skip license headers, comments, and imports at the beginning of files. This helps avoid false matches on standard boilerplate that appears in many files. Example:file_snippet.skip_headers_limit
Maximum number of lines to skip whenskip_headers is enabled. Controls how much of the file’s beginning is ignored during matching.
Example:
file_snippet.dependency_analysis
Enable dependency analysis during scanning. When enabled, the scanner will analyze and report on dependencies declared in manifest files. Example:file_snippet.proxy
Snippet-specific proxy configuration that overrides the root-levelsettings.proxy. Use this when snippet scanning requires a different proxy than other operations.
Example:
file_snippet.http_config
Snippet-specific HTTP configuration that overrides the root-levelsettings.http_config. Use this when snippet scanning requires different API endpoints or certificate handling.
Example:
High Precision Folder Matching (HPFM)
HPFM (High Precision Folder Matching) settings control matching behavior for entire folder structures rather than individual files. This is useful for detecting when large portions of a codebase match known components.hpfm.ranking_enabled
Enable ranking specifically for HPFM (folder-level) operations. When enabled, folder matches are ranked by confidence to help you focus on the most significant structural matches. Example:hpfm.ranking_threshold
Specifies the minimum ranking score (0–10) HPFM (High Precision Folder Matching) uses to include folder-level matches in results.
A value of -1 defers to the server’s default threshold.
Example:
BOM
Thebom section defines rules for modifying the BOM before and after scanning. It contains three main operations:
Include Rules
Rules for adding context when scanning. These rules will be sent to the SCANOSS API meaning they have more chance of being considered part of the resulting scan.Remove Rules
Rules for removing files from results after scanning. These rules will be applied to the results file after scanning. The post processing happens on the client side.Replace Rules
Rules for replacing components after scanning. These rules will be applied to the results file after scanning. The post processing happens on the client side.Important Notes
Matching Rules- Full Match: Requires both PATH and PURL to match. It means the rule will be applied ONLY to the specific file with the matching PURL and PATH.
- Partial Match: Matches based on either: - File path only (PURL is optional). It means the rule will be applied to all files with the matching path. - PURL only (PATH is optional). It means the rule will be applied to all files with the matching PURL.
- All paths should be specified relative to the scanned directory
- Use forward slashes (
/) as path separators
/project/src, then:
component.jsis a valid pathlib/utils.pyis an invalid path and will not match any files
src/component.jsis a valid pathlib/utils.pyis a valid path
- Format:
pkg:<type>/<namespace>/<name>@<version> - Examples: -
pkg:npm/vue@2.6.12-pkg:golang/github.com/golang/go@1.17.3 - Must be valid and include all required components
- Version is strongly recommended but optional