Include SCA Findings in Policy
Click here to read how to restrict an application from using vulnerable third-party components by adding Veracode Software Composition Analysis requirements to your policy.
Click here to read how to restrict an application from using vulnerable third-party components by adding Veracode Software Composition Analysis requirements to your policy.