Skip to main content
Once a product is created, it can serve as a container for related images or successive versions of analyzed binaries. This organization facilitates streamlined analysis and review of vulnerabilities or configuration issues.

Uploading and Organizing Images

  1. Image Upload:
    • Images can be added to a product either during its creation or later via the Upload Image option.
    • Products are designed to track images by version. Proper trending and analysis comparisons by version are dependent on this structure. Although products c_an_ accommodate an unlimited number of different images, for optimal operation of the Product you MUST:
      • Group similar images or related versions within the same product.
      • Separate dissimilar images into distinct products for better organization and analysis clarity.
  2. Recommendations for Organization:
    • Use consistent naming conventions for products and associated images to maintain a logical structure.
    • Ensure that each product contains only related images to simplify analysis and reporting.

Viewing Images in a Product

  1. Accessing Images:
    • Navigate to the desired product to view its uploaded images.
    • The list of images associated with the product will display in the grid view.
  2. Processing Status:
    • After an image is uploaded or submitted via the API, it will initially show a “Processing” status while the platform analyzes the binary.
    • Once the analysis is complete:
      • The file name will be displayed in purple text.
      • The number of findings associated with the image will also appear in the grid.
  3. Detailed Findings:
    • Click on the file name (purple text) to view a comprehensive list of findings for the analyzed binary.
    • This detailed view provides insight into vulnerabilities, misconfigurations, and other issues identified during the analysis.

Benefits of Viewing Images by Product

  • Provides a consolidated view of all analyzed binaries within a logical grouping.
  • Enables efficient navigation between images and their findings for detailed review and remediation planning.
  • Facilitates tracking and management of multiple versions or updates of the same firmware or software.
This structured approach to viewing and organizing images ensures users can efficiently manage data and focus on actionable insights. Trending provides a graphical representation of issues identified over time for a selected product. This visualization helps users track the evolution of vulnerabilities, misconfigurations, or other findings, offering a clear visual summary of changes based on new scans.
  1. Issues Over Time:
    • Displays trends in findings categorized by age and severity.
    • Highlights the progression of issues, including new discoveries and resolved items.
  2. Customizable Date Ranges:
    • Users can adjust the date range to focus on specific timeframes of interest.
    • This flexibility allows for targeted insights into historical patterns or recent developments.
  3. Visual Summaries:
    • Offers an at-a-glance overview of the product’s security posture and its changes over time.
    • Identifies spikes or reductions in findings, aiding in prioritization and decision-making.
  • Actionable Insights:
    • Helps prioritize remediation efforts by highlighting trends in critical or high-severity findings.
  • Historical Context:
    • Provides a historical perspective on the product’s security, enabling better understanding of long-term risks.
  • Customization:
    • Allows users to tailor the view to meet specific needs, whether for reporting, analysis, or planning.

Latest Scan

The Latest Scan feature tags the most recent analysis of a product as “Latest” and ensures its results are prominently reported in both the primary and product-specific dashboards. This feature provides a comparative view, allowing users to monitor changes and assess progress across different versions of the same binaries.

Key Features of the Latest Scan

  1. Comparative Analysis:
    • Visibility into differences between versions of the same binaries, showing improvements, new findings, or regressions.
    • Provides insights into how updates or patches have impacted the security posture.
  2. Dashboards Visibility :
    • Results from the latest scan are displayed on:
      • The primary dashboard, offering a high-level overview of all products.
      • The product-specific dashboard, focusing on granular details for that product.
  3. Third-Party Supply Chain Validation:
    • Confirms that updated binaries address previously identified issues.
    • Offers visibility into potential new issues or regressions introduced in the latest version.
  4. OEMs and Software Vendor Use Cases:
    • Demonstrates improvements in code quality and security measures addressing vulnerabilities.
    • Validates that updates meet the security and compliance requirements of end-users or partners.

Benefits of the Latest Scan

  • Improved Monitoring:
    • Enables continuous tracking of a product’s security posture over successive scans.
  • Actionable Insights:
    • Helps OEMs, software vendors, and supply chain partners prioritize further remediation or development efforts.
The Latest Scan feature is a vital tool for maintaining transparency, validating improvements, and ensuring the security and reliability of binaries over time.

Upload Image (Plus Icon)

With a product selected, images can be uploaded by clicking the plus icon in the lower right section of the grid view. This action automatically associates the uploaded image with the selected product. Once the upload dialog appears, you can drag and drop the file or navigate to it on your machine. An upload progress dialog appears in the lower right of the interface. Upon completion, the image will begin processing, with times varying based on file type, size, and complexity. During processing, a spinning circle and an “In Progress” message will appear. Active scans can be monitored from the product view or via the scans menu, which is covered in another section. When the scan is completed, findings and severity details will populate, preparing the results for review.

Fields

Fields in the Images Grid

The Images Grid provides detailed data about analyzed images, organized into columns. Each column heading offers options to sort and filter, enabling efficient navigation—particularly useful for tracking multiple image versions within a product.

Key Fields

  1. Name:
    • Displays the file name of the uploaded image.
    • After analysis completion, the name becomes clickable, providing access to a detailed overview of the results.
  2. Findings:
    • Shows the total number of findings identified in the analyzed image.
    • Excludes mitigations and weaknesses to focus on actionable issues.
  3. Severity:
    • Categorizes findings by severity level:
      • Critical, High, Medium, Low, and Unspecified.
    • Provides counts for each category, helping users prioritize issues.
  4. Scanned and Uploaded:
    • Displays two timestamps:
      • Uploaded: When the image was submitted.
      • Scanned: When the analysis was completed.
  5. Created By:
    • Identifies the user who uploaded the image and initiated its scan, offering accountability.
  6. Feature Tags:
    • Highlights the features available for the image, such as:
      • Reports: JSON and PDF analysis summaries.
      • SBOM: Software Bill of Materials.
      • CBOM: Cryptographic Bill of Materials.
  7. Action Menu:
    • Provides follow-up options for the analyzed image, including:
      • Rescan the image.
      • Adding Debug Information/Symbols.
      • Generating Reports (e.g., PDF, JSON).
      • Downloading the image file, SBOM, or CBOM.
      • Archiving the image for better workspace organization.
Benefits
  • Efficient Navigation: Sorting and filtering options simplify image tracking and review.
  • Detailed Insights: Provides quick access to findings and severity breakdowns for informed decision-making.
  • Streamlined Workflow: The action menu enhances usability, enabling fast execution of key tasks like rescanning or generating reports.

Viewing image details

Products are created to organize and house images assessed by the platform. Images can be uploaded directly to the platform from the actions menus discussed above or from an API call run from a command line, CI pipeline, or other automated mechanism. Please see the API documentation and use cases guide for information about leveraging the API. Once an image is selected from the product View, it will present all information about the findings discovered during the scan of the selected image. This image-specific view serves as a primary interface to view the details of the various finding types, assess and prioritize actions to be taken, and better understand the overall risk associated with a specific image scan.

Image Overview (Product Specific Dashboard)

The image overview serves as a heads-up display and summary review of the findings discovered within the analyzed image. Tabbed navigation to the different finding types and categories, as well as interactive graphical displays of the findings, are available to help aid understanding of the analysis and Provide easy navigation to specific areas of Interest or most critical findings. Dash1 Pn Tabbed views Findings—Your primary view to review finding details provides a highly customizable grid view. You can quickly sort, filter, and prioritize the different findings. Findings can be drilled into for extended information. Cryptographic materials—This view isolates cryptographic findings. It provides insights into discovered and potentially problematic keys, algorithms, and certificates. Secrets - The secrets tab will reveal sensitive information discovered within the binary. This includes API credentials, encryption keys, JSON web tokens, webhooks, and other sensitive details. Secure by Design: This section covers issues related to CISA’s Secure by Design principles and the NIST SP 800-218 Secure Software Development Framework. It highlights where current practices deviate from recommended security standards in coding and points out missed opportunities to build and ship more secure software. Dependencies- Dependencies provide a detailed grid View of the dependency findings organized by the individual dependency. This provides an efficient presentation of the findings by Dependency, including relationship and impacted components. Components- This tab lists all components discovered within the assessed binary in a Tree View. History—This view details the history of the image scan, including the name, Scan Timeframes, who scanned it, and any other activities, such as rescans. Image Information Blocks Image- Full file name of the image uploaded with the ability to download a copy of the image from the platform to a local device Attached symbols—This allows you to attach debug information or symbols (PDB Files). When debug symbols are provided (a rescan of the image is triggered on upload), they can enhance the decompiled pseudocode representation of vulnerabilities, presenting more precise details. Scanned—This provides a date and time stamp for when the platform completely and fully processed the image scan. Uploaded- This provides a date and time stamp for when the image upload to the platform was completed. The delta between uploaded and scanned values is the duration of the scan.

Interactive dashboard graphs ( Product specific)

Priority Findings This graph details the high, critical, and medium severity findings across all products and images. It is designed to highlight the most pressing issues for investigation or remediation. The areas of the graph are Interactive and can be used to sort or drill directly into a filtered binding page detailing the graphed data. Critical Unknown Findings This graph details and lists only unknown vulnerabilities discovered across all products and images. The graph is sorted by class of vulnerabilities, such as DXE Memory Corruption or SMM Memory Content Disclosure. Listed within these classes are the discovered unknown vulnerabilities. Unknown vulnerabilities are all classified as critical severity findings as they have not been previously seen before and are technically zero-day. Drilling down any portion of the graph will take you to a filtered list of the findings sorted by only unknown finding type. Finding Types The finding types are crucial to understanding the vulnerabilities and issues discovered and how many exist within each finding category. This graph can serve as a quick view to understand where the vulnerabilities and problems exist within this image. With this information, an analyst can go directly to the associated tab, where many issues are preset, or a specific category of findings may be of interest or concern. Drilling down in the graph will take you to a filtered View in the findings tab filtered by the selected issue type. Unreviewed findings The platform supports Triaging and tagging specific issues within the findings grid. This is designed to help ensure the most critical findings are tracked and appropriate actions are taken. It provides a means to assess what has quickly and has yet to be reviewed by an analyst or user of the platform. Status settings include New, In progress, Rejected, and Remediated. This graph provides a glance at the issue status from the Assessed Binary. The unreviewed findings graph does not support drill down and is only offered as an informational representation. Vulnerable External Dependencies The vulnerable external dependencies graph represents a high-level overview of the statically linked and transitive dependencies discovered within the images analyzed by the platform. This important representation provides visibility of the proper dependencies and components that make up the firmware, Linux packages, or containers analyzed by the platform. Hovering specific dependency names will provide visualizations of the versioning and counts of this particular dependency. Given this potentially large number of identified Dependencies, details are available within each image under the dependencies tab. Findings Tab The Findings tab within a product is one of the most accessed sections. It provides a comprehensive grid view with highly customizable columns. This layout supports advanced searching, filtering, and sorting capabilities, enabling users to efficiently review, prioritize, and manage finding data and details. Columns The findings grid is organized into columns, each detailing specific aspects of individual findings to aid in data consumption, prioritization, and action planning. All columns support searching, sorting, and filtering, with additional customization options to select and lock specific columns, ensuring a tailored view for enhanced usability. Sorting and Filtering Each column offers distinct sorting and filtering options based on the type of data it represents. For instance:
  • The CVSS column includes a range-based filter to specify a range of scores.
  • The Type column provides a pick-list menu with available options.
  • The Finding column includes a free-form search box for text-based searches.
All columns support ascending and descending sorting, allowing users to refine their views further for efficient data analysis and action. Filter by CVSS score range *Filter by Finding *

Filter Settings

You can configure column display settings through the Settings menu, accessible via the gear icon on the upper right of the grid. Selecting this icon opens the Column Selection menu, where you can customize the grid view to suit your preferences. Here, you can choose which columns to display in the grid view. To fix a column to the left or right side of the grid, use the up and down arrows beside each column name. Additionally, you can reorder columns by dragging and dropping them to your preferred sequence. This allows you to effectively organize and prioritize the data view, optimizing your workflow’s layout.

Filters Menu (Advanced Filtering)

As the platform processes an increasing volume of images and products, the associated datasets and findings can become extensive. To manage this complexity, creating customized datasets based on specific criteria is essential for efficiently searching and visualizing issues.

Overview of the Filters Menu

The Filters Menu, located in the upper-right corner of the interface, offers powerful tools for constructing complex filters. These filters enable users to apply a wide range of criteria across all data columns, allowing for the creation of tailored views that focus on specific findings or groups of findings.

Key Capabilities

  • Custom Filtering: Apply filters to refine datasets based on severity, product type, date, vulnerability class, or other parameters.
  • Multi-Criteria Filtering: Combine multiple filters to create highly specific datasets, enhancing the ability to identify and prioritize critical issues.
  • Column-Specific Filters: Use column-level filtering to target findings relevant to your analysis.

Benefits

  1. Efficient Data Management: Navigate and manage large datasets with ease, ensuring that key findings are not overlooked.
  2. Focused Insights: Narrow down results to the most relevant issues, allowing for targeted remediation efforts.
  3. Streamlined Exploration: Create customized views that simplify the analysis process and improve decision-making efficiency.
The advanced filtering capabilities of the Filters Menu provide users with a robust framework for managing extensive data, enabling effective exploration and prioritization of findings across multiple images and products.

Finding Details

To access detailed information about a specific finding, click on any linked text or anywhere within the corresponding row in the Findings Grid. This action will open the detailed view for the selected finding, where the type of finding and available data determine the information displayed. The finding details page displays reference information such as metrics from the Common Vulnerability Scoring System (CVSS), the Exploit Prediction Scoring System (EPSS), and the Exploit Maturity Score (EMS). It also shows confidence and reachability analysis to indicate the exploitability of the finding. Classifications are provided using the Common Weakness Enumeration (CWE), Mitre Adversarial Tactics, Techniques, and Common Knowledge (ATT&CK), and the Malware Behavior Catalog (MBC) ontologies. The page indicates whether the vulnerability is listed in CISA’s Known Exploited Vulnerabilities Catalog (KEV) and whether it is known to be used in ransomware campaigns. Additionally, the page lists vulnerability identifiers issued by the Common Vulnerabilities and Exposures (CVE) system, along with a description of the vulnerability, its impact, recommended actions, and links to proof-of-concept code, weaponized exploits, vendor announcements, and other references. The page also provides a detailed breakdown of the component affected by the finding. Components may be files, UEFI modules, or PEI modules detected in the uploaded image. In addition to the component’s name and path inside the image, the finding details page shows its size, type, and type-specific information, such as an executable’s dynamic linker or a UEFI module’s GUID. If the component is a binary, information about the type of compilers used during the build process appears next to it. Multiple compilers or multiple versions of the same compiler may have contributed to the build, and the build environment section also includes the instruction set architecture and the operating system ecosystem of each compiler. The finding details include the evidence, which delivers deep technical insights. Depending on the type of finding, this may be decompiled pseudocode, affected address ranges, or a structured representation of the offending artifact, such as a cryptographic asset’s key length, algorithm, and certificate validity. If the affected component is part of a dependency, its product name, vendor, and detected version range are shown on the finding details page. If the issue indicated by the finding can be remediated by updating the dependency, the earliest safe version is also displayed alongside the dependency information. The detailed view enables users to investigate findings effectively and provides the necessary context to prioritize remediation efforts. This granular insight supports a comprehensive understanding of vulnerabilities,their associated risks and mitigation actions to be considered.

Finding Detail Options

Within a findings, options exist to afford users the ability to set a status or mark a specific finding with a label, create tickets using the built-in Integrations, and generate reports specific to that finding

Set Status

The Set Status feature allows users to categorize a finding’s progress or resolution state. These statuses are visible to all users and are reflected in the Unreviewed Findings graph on the product-specific dashboard. This functionality aids in tracking review progress and documenting decisions regarding specific findings within an image.

Status Options

  1. New:
    • Default status for all findings that have not been reviewed or updated.
    • Represents findings that require initial assessment.
  2. In Progress:
    • Indicates a finding is under active review, investigation, or remediation.
    • Used when:
      • The issue is being addressed in code.
      • Mitigation efforts are underway by a third-party vendor.
  3. Rejected:
    • Marks findings that are:
      • Determined to be false positives.
      • Classified as non-threats (e.g., mitigated upstream or deemed unreachable).
    • Commonly used when a finding does not require further action.
  4. Remediated:
    • Used for findings that have been successfully patched or mitigated.
    • Represents a resolved issue with no further action required.
By setting the status of findings, users can enhance collaboration, maintain accurate records, and provide visibility into the review and remediation process for all stakeholders.

Create Ticket

The Binarly Transparency Platform offers a built-in, Two way integration with Atlassian Jira, enabling seamless issue tracking and management. To use this feature, the Jira integration must be pre-configured via the Main Settings menu.

Configuring Jira Integration

For detailed instructions on configuring Jira integration, please refer to the Intergerations Section.

Using the “Create Ticket” Feature

Once the integration is set up, the Create Ticket option allows you to generate issues directly within your Jira system, leveraging the two-way integration capability. Key functionality includes:
  1. Issue Creation:
    • Findings from the Transparency Platform can be forwarded as Jira issues.
    • The integration automatically transfers finding details into the newly created Jira ticket.
  2. Organizational Alignment:
    • Tickets are created within your organization’s Jira project structure, ensuring alignment with existing workflows.
  3. Visibility in the Binarly Transparency Platform:
    • After a Jira ticket is created, the corresponding finding in the Transparency Platform will display the Jira ticket headline and a direct link to the Jira issue.
    • This integration enables streamlined tracking and resolution without switching between platforms.

Get reports

This option gives you the ability to generate finding specific detailed reports in either a JSON, PDF, or CSV format. these reports will contain all pertinent finding details including All relevant finding information (names, descriptions, and Reachability analysis), References (CVE, EPSS, CVSS, advisories) , and detailed component vulnerability information (Offset or relative address, handler information, pseudo code representation).
Generating Detailed Reports The “Get Reports” feature enables users to generate comprehensive, finding-specific reports in JSON or PDF formats. These reports provide a thorough breakdown of all pertinent details related to identified findings, ensuring complete visibility into vulnerabilities and associated risks. Key elements included in the reports are:
  1. Finding Information:
    • Names and descriptions of the findings.
    • Reachability analysis, highlighting how vulnerabilities can be accessed and exploited.
  2. References:
    • Detailed citations such as CVE (Common Vulnerabilities and Exposures) IDs, EPSS (Exploit Prediction Scoring System) data, and CVSS (Common Vulnerability Scoring System) metrics.
    • Links to relevant advisories for remediation guidance.
  3. Component Vulnerability Insights:
    • Precise information on vulnerabilities within specific components, including offsets, relative addresses, and handler details.
    • Pseudocode representations that illustrate the functionality and potential exploitation paths within the analyzed binaries.

Findings types

Unknown Vulnerabilities

These are zero-day vulnerabilities requiring immediate attention. Unknown Vulnerability Analysis identifies vulnerabilities within specific classes, such as NVRAM variable handling and SMM callouts. The component section details the affected module’s name, hash, GUID Path, AData size vulnerability, and Architecture. Depending on the finding type, additional data may include callout and handler offsets, variable names, locations, and other relevant details. Descriptions are based on triggered rules but are unique to the customer’s environment. Data from Unknown Vulnerability Analysis should be tightly controlled until the finding’s exploitability has been validated or the vulnerability has been mitigated or remediated.

Vulnerability Detail

Vulnerability location detail Psudocode representation

Known Vulnerabilities

Refer to security flaws in software, firmware, or components that have been identified, documented, and assigned identifiers like Common Vulnerabilities and Exposures (CVEs) and, Exploit Predictability (EPSS) . These vulnerabilities are publicized to inform organizations, developers, and security teams to implement appropriate mitigations or patches. Known Vulnerability findings Include extensive detail to help analysts and security Engineers better understand the known vulnerabilities and prioritize mitigation. details provided include the aforementioned industry references, reachability analysis, In-depth component vulnerability detail as well as pseudocode representations of the vulnerability. Here’s an overview of key aspects of known vulnerabilities:

Malicious Code Detection

This involves identifying harmful entities such as malicious implants, hooks, embedded executables, or other anomalies within analyzed images, offering robust security analysis and risk mitigation to businesses. These elements are crafted by attackers to infiltrate, persist, and potentially exfiltrate sensitive data or compromise a system. Malicious code can evade current defense platforms because it blends in with standard functionality and can remain dormant or operate in stealth for long periods of time. The Binarly Transparency Platform identifies the module name and type, then checks for the existence of embedded executables, Malicious Hooks, and their functions, as well as Firmware Implants. Findings provide in-depth details as to the severity, location, and capabilities associated with the detected threat(s) including module type, name, kind or function, Offset (virtual address), and industry references.

Dependency Findings

Dependency findings focus on identifying vulnerabilities within both direct and transitive software dependencies. These vulnerabilities may arise in open-source libraries or other third-party components utilized in software development, potentially introducing supply chain risks. Dependency vulnerabilities constitute a significant portion of third-party supply chain issues, making it essential to identify vulnerable or potentially at-risk components and subcomponents embedded in software. This is critical for understanding risks that may not be immediately apparent at the application level. Dependency findings include standard industry references such as CVE (Common Vulnerabilities and Exposures), CWE (Common Weakness Enumerations), and CVSS (Common Vulnerability Scoring System). These references are derived from queries to the National Vulnerability Database (NVD) based on key characteristics of the identified components and dependencies. In addition to these references, further analysis enhances the findings with identifiers such as GitHub security advisories, EPSS (Exploit Prediction Scoring System), and CISA references, including Known Exploited Vulnerabilities (KEV) and known ransomware associations. Custom reachability analysis and fix information is also provided for deeper insights and critical prioritization information. Vulnerable component details include attributes such as name, GUID, path, magic strings, and architecture, offering comprehensive context for prioritizing and addressing risks effectively. Dependency references

Cryptographic Findings

Cryptographic findings highlight flaws in the cryptographic materials identified within the analyzed image. These flaws can include the use of deprecated algorithms, weak keys, expired certificates, cryptographic protocols, or improper implementations that may expose systems to risks such as data interception or forgery. The findings provide critical details about the cryptographic materials, such as in-depth certificate parameters, including issuer, origin, and expiration information. Additionally, they include information about algorithms used within the binary, which is particularly important for ensuring compliance with post-quantum computing standards PQC (NIST IR 8547) and security.  As post-quantum computing regulations take hold, having visibility into compliant algorithm usage—especially within third-party components—is becoming essential. IR 8547 compliance reports can be generated in PDF or JSON formats, providing detailed issue identification along with mitigation guidance to help meet compliance requirements..  ication of issues and all related detail as well as mitigation guidance for compliance.  Cryptographic findings include data on certificates, private keys, and public keys discovered within the image, whether they are vulnerable or not. These findings can be reviewed directly within the platform or exported as a Cryptographic Bill of Materials (CBOM) for further analysis. For vulnerable cryptographic assets, the findings include CWE classifications, descriptive details, and component-specific information regarding where the asset was identified. Evidence information is tailored to the type of key, algorithm, or certificate discovered. Certificates provide detailed parameter information, while keys and algorithms include component-level details and information about their cryptographic functions.  reachability analysis is also performed against all discovered cryptographic materials.  This provides enhanced context as to risk associated with discovered materials within the binary files Crypto1 Pn Crypto2 Pn

Secure By Design


These findings call out risks and issues that can impact the integrity and security of software and hardware supply chains. They typically surface during manufacturing, distribution, or integration and point to deviations from CISA’s Secure by Design guidance and the NIST SP 800-218 secure development framework. Issues are categorized as unsafe functions, mitigation failures, weaknesses, expired certificates, and known exploited vulnerabilities (KEVs).
Mitigation & Weaknesses identify misconfigurations or flaws in firmware or software, which could potentially lead to security breaches. The vast majority of these findings are low in severity, as they typically reflect an oversight or failure to implement practices in software development that could enhance or harden the security of the affected components, rather than a vulnerability or threat being present. Examples include usage of unsafe functions and failure to implement protection mechanisms such as RELRO, Stack Canaries, and Control Flow. Finding details for mitigations and weaknesses include classifications that outline Common Weakness Enumerations (CWE), details about impacted components, and specific information about the finding. This may include impacted function lists, associated references, and other relevant contextual data. In this screenshot, we are investigating Missing Stack Canaries.

Secret Findings

The platform utilizes regex-based rules to detect hardcoded sensitive information, such as API keys, JSON web tokens, OAuth tokens, encryption keys, or webhook URLs embedded within scripts or files. If exposed, such secrets could be exploited by attackers. While secrets can be identified in any image analyzed by the platform, they are particularly prevalent in Docker containers and embedded Linux binaries. Finding details for secrets include classifications aligned with Common Weakness Enumerations (CWE) and detailed descriptions of the identified issue. Component details specify the location or the specific component, script, or file in which the embedded secret was discovered. Evidence information includes the actual secret value and its entropy, providing a thorough context for addressing the risk.

Components Tab

The Component tab displays a static tree view of the various components identified within the analyzed binary. While this tab does not provide extensive details about the individual components, it offers valuable insights into the overall structure and hierarchy of the discovered components. The root of the analyzed file is represented as input.bin, corresponding to the top-level file uploaded to the platform for analysis. This provides users with a clear representation of the parent file and its associated components. For more detailed information on the identified components and to access export capabilities, it is recommended to generate a Software Bill of Materials (SBOM). Detailed instructions on SBOM generation and usage are covered in the Platform Outputs section of this guide.

History Tab

The History tab provides comprehensive historical tracking of actions taken on a selected product and its analyzed images. It records scan actions, offering visibility into all activities performed for a specific product. This view is particularly useful for tracking the user who initiated a scan, the dates and times when scans were started and completed, and the duration of each scan. Although the History tab focuses on tracking actions specific to the selected image within a product, a broader scan history view for all scans performed across the platform is available. This platform-wide history can be accessed via the Scans menu in the vertical navigation options on the left side of the interface. This feature enables users to monitor scan activities efficiently at both the individual product level and the platform-wide level.