Content deleted Content added
Citation bot (talk | contribs) Alter: pages, template type, journal, url. URLs might have been anonymized. Add: isbn, doi, citeseerx, s2cid, issue, volume. Removed proxy/dead URL that duplicated identifier. Formatted dashes. | Use this bot. Report bugs. | Suggested by AManWithNoPlan | #UCB_CommandLine |
Commenting on submission (AFCH 0.9.1) |
||
Line 1:
{{
{{AFC comment|1="Usage" section almost entirely unsourced. First paragraph of "Overview" section also unsourced. Other than that, looks good, and would be happy to accept when these minor things are sorted! [[User:Mattdaviesfsic|Mattdaviesfsic]] ([[User talk:Mattdaviesfsic|talk]]) 17:37, 13 January 2023 (UTC)}}
----
{{Short description|Software Composition Analysis}}
{{Draft topics|software|technology}}
{{AfC topic|other}}
It is a common [[Software engineering|software engineering]] practice to develop software by using different components..<ref>▼
▲{{AfC submission|t||ts=20221109174835|u=Adwerald|ns=118|demo=}}<!-- Important, do not remove this line before article has been created. -->
▲It is a common [[Software engineering|software engineering]] practice to develop software by using different components.<ref>
{{Cite journal
|last1=Nierstrasz|first1=Oscar
Line 170 ⟶ 175:
|s2cid=233582862
|url=https://ieeexplore.ieee.org/document/9821841
}}</ref>
== SCA Weaknesses ==
Line 202 ⟶ 207:
|url=https://dl.acm.org/doi/pdf/10.1145/3475716.3475769
}}</ref>
* Limiting vulnerability data to reporting only on vulnerabilities officially reported in the NVD (which can be months after the vulnerability was originally discovered)
* Lack of automated guidance on actions to take based on SCA reports and data <ref>
{{Cite journal
|