Black Duck Software Composition Analysis

Manage risk in open source software 

Black Duck by Synopsys provides a comprehensive software composition analysis (SCA) solution for managing risk that comes from the use of open source and third-party code in applications and containers. Black Duck gives you unmatched visibility into third-party code, enabling you to control it across your software supply chain and throughout the application life cycle.

What’s hiding in your applications?

Third-party code saves time and money, but it can also harbor dangers like these:

  • Security vulnerabilities (e.g., CVEs identified in the National Vulnerability Database)
  • Common software weaknesses (e.g., SANS Top 25 or OWASP Top 10)
  • Risks related to license violations and IP ownership
See what we observed in the latest Open source security and risk analysis report.

Black Duck helps you navigate OSS with ease

Black Duck software composition analysis combines versatile open source risk management and deep binary inspection in a best-in-class solution. Black Duck gives development, operations, procurement, and security teams the tools they need to minimize the security, compliance, and code quality risks of open source and other third-party software, while still realizing the benefits that come with it.


find open source in code


• Identify open source in code, binaries, and containers
• Detect partial and modified components
• Automate scanning with DevOps integrations

identify open source license risk


• Map components to known vulnerabilities
• Identify license and component-quality risks
• Monitor for new vulnerabilities in development and production

open source security policies


• Set and enforce open source use and security policies
• Automate policy enforcement with DevOps integrations
• Prioritize and track remediation activities

We’re a Gartner Magic Quadrant Leader in application security testing—again.

Find out why

Smooth sailing with source code analysis

With Black Duck, you can identify and track open source components within your applications’ source code and monitor for new and existing vulnerabilities that put them at risk.

source code analysis with Black Duck

We selected Black Duck for three reasons: for reputation, ease of use, and confidence in the results."

Lawrence Croft


VP Product Development at Copperleaf

Use multifactor open source detection.
Identify declared components, unique hash signatures, and dependencies resolved during a build.

Generate a complete inventory of open source in use.
Track all third-party components, licenses, and versions contained in your applications.

Map your bill of materials (BoM).
Map your BoM on the largest knowledge base of open source project, vulnerability, and license data. Make informed decisions with relevant risk metrics and actionable remediation guidance.

Get deeper vulnerability insight.
Access detailed, proprietary security risk insight from the Synopsys Center for Open Source Research & Innovation (COSRI). Receive notifications of new vulnerabilities up to three weeks before they are published in the NVD, reducing your window of exposure.

Combat code decay proactively.
Automatically receive alerts for newly discovered vulnerabilities in the components and dependencies within your BoM.

Breaking down DevSecOps

Build AppSec into your CI/CD pipeline with static application security testing and software composition analysis.

Watch the webinar

Binary analysis is a breeze with Synopsys

With Black Duck Binary Analysis, you can analyze systems and software to identify weak links in your software supply chain quickly and easily—all without source code.

Scan virtually any software or firmware in minutes.
This includes desktop and mobile applications, embedded system firmware, virtual appliances, and more.

Analyze without source code.
Simply upload the software you want to assess, and Black Duck performs a thorough binary analysis in minutes.

Obtain a comprehensive bill of materials (BoM).
Identify and catalog all third-party software components and licenses.

Identify known vulnerabilities and licensing obligations within software components.
Make informed decisions about the use and procurement of technology with realistic metrics.

Combat code decay proactively.
Automatically receive alerts for newly discovered vulnerabilities in previously scanned software.

Download datasheet

Master your supply chain

Gain visibility into the composition of purchased software, make better buying decisions, and manage the ongoing risk of operating complex systems and software.