Include SCA Findings in Policy

Application Security Policies

Click here to read how to restrict an application from using vulnerable third-party components by adding Veracode Software Composition Analysis requirements to your policy.