Find Vulnerable Dependencies
Locate and analyze dependencies with security vulnerabilities in your repository.
Prerequisites
Before you begin, ensure you have:
- Access to a DevGuard project and repository
- A completed dependency scan (SCA scan) or uploaded SBOM
- At least one known vulnerable dependency in your repository
Open the Dependency Risks View
Navigate to the vulnerability search and filtering interface:
- Navigate to Organization → Project → Repository → Dependency Risk Handling
- You’ll see a list of all packages with identified vulnerabilities
- Each row shows a vulnerable component in your Repository
Filter by Asset Versions (Git Branches/Tags)
If your repository has multiple asset versions (e.g., branches or tags), filter vulnerabilities by specific versions:
- Use the Asset Version Selector dropdown at the top of the page
- Select the desired asset version (e.g.,
main,release-1.0,v2.3.4) - The vulnerability list updates to show only vulnerabilities associated with the selected asset version
- You can further filter within that asset version using the artifact selector, state and the search bar
Learn more about devguard’s resource structure and how to organize your project using versions.
Filter by Artifact
If your repository contains multiple build artifacts or scanning sources, filter by specific artifacts:
- Use the Artifact Selector dropdown at the top of the page
- Select the artifact (e.g., specific container image, application build)
- The vulnerability list updates to show only vulnerabilities in the selected artifact
Artifacts are created using the artifactName flag in the DevGuard-Scanner
CLI during the scan. For example devguard-scanner sca --artifactName="pkg:oci/redis" --assetVersion="..." --token="..." --apiUrl="..." ..
[Learn more about devguard’s resource structure and how to organize your project using artifacts]/explanations/core-concepts/artifacts).
View Vulnerability Status
Show vulnerabilities in different states:
- Use the State Filter tabs:
- Open - Unresolved vulnerabilities requiring action
- Resolved - Vulnerabilities you’ve handled (false positives, accepted risks, fixed)
Search for Vulnerabilities
Find specific vulnerabilities using multiple search methods:
- By CVE ID: Search for
CVE-2024-1234to find exact vulnerability - By Component Name: Search for
react,log4j, etc. to find packages - By Description: Search for keywords like
buffer overflow,SQL injection
The search is case-insensitive and matches partial text:
Search Examples:
- "CVE-2024" → Finds all CVEs from 2024
- "spring" → Finds all Spring framework vulnerabilities
- "remote code" → Finds all RCE vulnerabilitiesThe search requires at least 3 characters to avoid too many results. Shorter searches are ignored.
Analyze Package Vulnerabilities
Click on any package row to see detailed vulnerability information:
- Click a package name (e.g.,
react@18.2.0) - View all CVEs affecting that package with:
- CVE ID - Official vulnerability identifier
- Severity - CVSS score and severity badge (Critical, High, Medium, Low)
- Risk Score - DevGuard’s calculated risk considering CIA requirements
- Description - What the vulnerability affects
- Exploits - Known public exploits (if available)
- Fixed in - Recommended version to upgrade to
View Fix Recommendations
For each vulnerability:
- Check the “Fixed in Version” column
- This shows the minimum version that fixes the issue
- Upgrade your dependency to at least this version
Example: If react@18.2.0 has CVE-2024-1234 fixed in 18.3.0, upgrade to 18.3.0 or later.
Currently DevGuard will propose changes in your transitive dependencies, which cannot be directly upgraded. This is a known flaw and will be improved in future releases.
Filter by Severity and Risk
Use advanced filtering to focus on the most critical vulnerabilities:
By Severity Level
- Critical - Highest priority, immediate action needed
- High - Important security issues to address soon
- Medium - Should be reviewed and prioritized
- Low - Informational, lower priority
By Risk Score
The DevGuard risk score considers:
- CVSS Score - Industry vulnerability severity
- Exploitability - Availability of known exploits
- CIA Requirements - Your asset’s confidentiality, integrity, availability needs
- Component depth - How deeply the component is used in your application
Higher risk scores mean the vulnerability is more likely to impact your application.
Identify High-Risk Components
The vulnerability list is ordered by risk score by default. The most critical vulnerabilities appear first.
Quick wins:
- Look for multiple vulnerabilities in the same package
- Focus on packages with critical or high severity scores
- Prioritize packages with available exploits
- Check if the vulnerable code path is actually used in your application
Create Events to Track Remediation
Once you’ve reviewed a vulnerability, document your decision:
- Click on a vulnerability row
- Choose one of these actions:
- Accept Risk - You accept the security risk and won’t fix immediately
- Mark as False Positive - The vulnerability doesn’t apply to your situation
- Mitigate - You’ve implemented a workaround
- Add Comment - Document investigation or remediation progress
Creating events doesn’t fix the vulnerability. It tracks your organization’s response for compliance and audit purposes.
Export Results
Download vulnerability data for reports or external tools:
- Click Download SBOM to export your component inventory
- Click Download VEX to export vulnerability exceptions document
- Share with security teams, compliance, or incident response
Troubleshooting
No vulnerabilities found
- Your dependencies may have no known vulnerabilities
- Verify your scan completed
- Ensure your SBOM includes all actual dependencies
Missing expected vulnerabilities
- The vulnerability database may not include your ecosystem (Currently we are syncing the following sources)
- Some ecosystems (like private registries) aren’t covered
- Check if the package was actually included in your scan
Cannot search for a specific CVE
- The CVE may not be in the DevGuard vulnerability database yet
- Search by component name instead
- Check external sources like CVE Details or osv.dev for confirmation
Next Steps
- Track Fix Progress - Monitor remediation efforts
- View Dependency Tree - Explore dependency relationships
- Generate VEX Documents - Document vulnerability decisions