Use Cases
π Vulnerability Detection
Overview
Myrror performs continuous vulnerability assessments across all open-source dependencies to safeguard your software development lifecycle.
Key Features
Vulnerability Prioritization
Myrror is a Software Composition Analysis (SCA) platform that enhances vulnerability management by integrating proprietary analysis capabilities:
- Reachability: Measures the accessibility of vulnerabilities within the environment.
- Exploitability: Assesses the ease of exploiting a vulnerability.
- Business Impact: Evaluates the potential damage a vulnerability could cause.
Coverage
Myrror protects against vulnerabilities in various segments of the software supply chain by:
- Detecting and prioritizing vulnerabilities.
- Automating prioritization processes.
- Identifying and mitigating potential upstream supply chain attacks.
- Assisting in the remediation process.
Operational Procedure
Connect & Scan
- Connect Myrror to your source code management system.
- Perform a scan of all dependencies to identify vulnerabilities and supply chain threats.
Prioritize
- Analyze and prioritize identified vulnerabilities and threats based on their reachability, exploitability, and business impact.
Remediate
- Generate an automatic remediation plan.
- The plan considers newly discovered vulnerabilities to devise the most effective remediation strategy.