dpndncY
dpndncY
dpndncY logo
SCA & AI Code Risk Platform

Know if your code is safe to ship

Multi-ecosystem dependency scanning, container image scanning, vulnerability intelligence (OSV, NVD, GHSA, CISA KEV), native SAST, and AI context profiling. Assess upgrade risk before you patch. Correlate vulnerabilities with code findings and Attack Paths; enforce policy with PASS / FAIL and export SBOM, SARIF, and PDF reports.

SCA + SAST + AI
Dependencies and code in one workflow
Attack Paths
Vuln deps to code sinks
OSV · NVD · GHSA
CISA KEV and EPSS
Upgrade Risk Delta
Net risk before you patch
Container scan
Image tarball or registry

Risk clarity from package to code path

Dependency intelligence, vulnerability fusion, code-level findings, and AI context profiling with policy gates and export-ready reports.

🛡
Vulnerability Intelligence

Correlates OSV, NVD, and GHSA with EPSS and CISA KEV to prioritize exploitable risk. Filter by match type (range vs. exact version), triage inline, and get fix guidance in context.

OSV NVD / CVSS EPSS CISA KEV
License Compliance

Normalizes license metadata, classifies risk categories, and highlights unresolved licenses with package-level evidence for targeted legal review.

Multi-ecosystem GitHub fallback GPL / MIT / Apache
🔐
Policy Enforcement

Define PASS / FAIL gates for CVSS, severity counts, exploitability, known-exploited status, and license posture. Track policy failures and remediation over time.

PASS / FAIL gates CI/CD native Configurable rules
🤖
Code Security + AI Context

Native SAST with 300+ rules across 9 languages, taint tracking, and AI context profiling. Attack Paths connect vulnerable dependencies, imports, sinks, and HTTP routes in a scored graph.

Native SAST AI context Attack Paths Risk amplification
📊
Upgrade Risk Assessment

Before patching, assess net security risk of moving from the current version to any target. Compare CVE exposure on both sides, review compatibility changes, and get a clear upgrade recommendation inline with the vulnerability finding.

Net risk delta Compat review Inline in Findings
📦
Container image scanning

Scan container images for dependency and vulnerability risk. Upload a Docker-save tarball or pull from a registry; get SBOM and vuln correlation for image layers.

Tarball Registry OCI Layer SBOM

See every layer of your supply chain risk

Real screenshots from the platform — dashboard, vulnerabilities, SAST, attack paths, remediation, governance, and integrations.

dpndncy / scan / overview
Scan overview dashboard
DashboardVulnerabilitiesCode & SASTAttack PathsRemediationGovernance

7 feature areas. Full screenshots. Real platform.

Explore every view of the platform with real screenshots and detailed descriptions of what you can do at each step.

Open Product Tour →

From scan to decision in minutes

Choose a scan mode and get dependency risk, code findings, and policy outcomes in one workflow.

1
Scan Dependencies

Scan a local path, uploaded manifest/zip, GitHub repo, or container image (tarball or registry). dpndncY resolves direct and transitive dependencies, then correlates OSV, NVD, GHSA, EPSS, and CISA KEV.

2
Analyze Code Context

Use scan mode to enable AI Risk and/or native SAST. dpndncY profiles AI context concentration, structural code risk, and code-level findings for governance and remediation planning.

3
Correlate Attack Paths

Attack Paths link vulnerable dependencies to code sinks and reachable entry points. Risk amplification highlights combinations where vulnerable packages and higher AI-context code overlap.

4
Act & Enforce

Assess upgrade risk inline before patching, use remediation guidance and patch targets, and export results (CSV, CycloneDX, UBOM, SARIF, PDF) to fix faster and enforce policy in delivery pipelines.

Know what you ship. Control the risk.

Dependency intelligence, vulnerability fusion, upgrade risk assessment, SAST, AI context, and policy gates with clear PASS / FAIL and export-ready reports.