🌐
OWASP
owasp.org › www-project-dependency-check
OWASP Dependency-Check | OWASP Foundation
Dependency-Check is a Software Composition Analysis (SCA) tool suite that identifies project dependencies and checks if there are any known, publicly disclosed, vulnerabilities.
🌐
GitHub
github.com › dependency-check › DependencyCheck
GitHub - dependency-check/DependencyCheck: OWASP dependency-check is a software composition analysis utility that detects publicly disclosed vulnerabilities in application dependencies. · GitHub
OWASP dependency-check is a software composition analysis utility that detects publicly disclosed vulnerabilities in application dependencies. - dependency-check/DependencyCheck
Starred by 7.5K users
Forked by 1.4K users
Languages   Java 96.7% | PLSQL 0.8% | Groovy 0.7% | PLpgSQL 0.6% | TSQL 0.6% | Shell 0.4%
Discussions

How often do you review your dependencies?
With every build. Security Scanners are in the pipeline. We don't have a regular scan that goes over source code for projects that are built less often, yet More on reddit.com
🌐 r/devops
38
39
September 9, 2023
OWASP dependency checker
Hello there! Has anyone used the OWASP dependency checker before, alongside of other SAST tools on their Jenkins pipelines? More on reddit.com
🌐 r/cybersecurity
2
3
October 3, 2021
Do you use dependency analysis and vulnerability detection tools?
Yeah we do. We use 1 to 3 tools and one training program. Will go over them one by one: OWASP DependencyCheck - a really decent tool for scanning your project for vulnerable dependencies. It is actively developed and updated and up to date with the most latest vulnerabilities. Sometimes it can be a pain in the ass, though. Some security researchers and such find a vulnerability, publish it and the next day our CI/CD pipelines fail (the dependency check build step prevents the code from going to production). And not always there is a fix available. So, some vulnerabilities have to be ignored, temporarily. Also, to be able to ignore a vulnerability one has to do a fast risk assessment. And that will require from him to read about the vulnerability and decide if it is safe to be ignored or some different workaround must be found. Trivy scan - I have a bit mixed feelings with that. It scans more stuff than OWASP DependencyCheck: Docker images, filesystem, VM, Kubernetes, etc. So in a way it is also very good. But then again, some of the vulnerabilities it finds is very difficult to fix. If not possible. Let's say it finds a vulnerability inside Gradle itself or inside Maven itself. These are tools that regular developers are not maintaining. Only the developers who actually develop Gradle/Maven itself and improve it, they can fix it. Or some pull requests on their projects. But you'll never know when your pull request gets accepted. Also as it finds vulnerabilities from unorthodox places like filesystem, Docker images, VM image, then it can be difficult for a common software developer to fix it. Sure, there are fixes and workarounds but these are not straightforward. FOSSA scan - it is different from OWASP DependencyCheck and from Trivy scan. It is checking code for supply chain attacks on dependencies and for for license violations. For example, let's say, your project is using DependaBot tool for automatically upgrading dependencies. And you are using, I don't know, Gradle v7.6 (currently the latest version). A malicious person takes the source code of Gradle v7.6, adds some malicious stuff in it and publishes it in Maven Repository with version 7.7 . Don't know about DependaBot but some tools for sure will try to upgrade your 7.6 to 7.7 then. And often these upgrades are automated. If all the tests pass, end-to-end functionality tests pass, deployment passes, then the upgrade goes through. AND a vulnerability can be introduced to your system. FOSSA scan is for checking if the dependency supply chain is legitimate or fake. A downside is that a full scan will take many hours. So one of our teams is just testing it out, right now. It is not feasible to put a 4 hour blocker in our build pipelines. But with fast releases a vulnerability can be introduced already into the system. Hoxhunt - a security awareness training program for companies. It will generate suspicious emails and will send them to employees. Its goal is to train employees to not click random stuff, download random stuff, answer to unverified emails, etc. A cyber hygiene in general. Some of the training emails can be very convincing. It is not your typical "Hi, I'm a Nigerian prince who wants to give you 1 million dollars." but it is "One of your repositories is having a vulnerable dependency in it and your company's security scanner detected it. Please check the following report for further details and how to act on them." type of an email. 3 tools are used in our CI/CD pipelines. It will just automatically scan the project whenever we push new code changes to our git repository. That Hoxhunt runs separately on background (a subscription) and will send emails to our employees with an irregular interval (to mimic a realistic scenario). The CI/CD scan tools are used by software developers, data engineers, some product managers, DevOps team and our cyber security team. All the people with a technical know-how. Hoxhunt is targeting all the developers. Business people and all kind of tech-illiterate managers and such as well. Hoxhunt is mandatory for everybody. Our cyber security team has "talks" with people who ignore it, misuse it, or actively fall a "victim" to the training emails without learning from their previous mistakes. Because the goal of Hoxhunt is to increase the overall security awareness. CI/CD pipeline tools... they are a strong recommendation. Not compulsory per se but it is a bad sign when your project does not use one of them. Some teams use all of these tools by default. Even that slow FOSSA scan. Other teams use only OWASP DependencyCheck and/or Trivy scan. More on reddit.com
🌐 r/learnprogramming
2
2
January 16, 2023
OWASP Dependency Check

Did you try Google?

More on reddit.com
🌐 r/Hacking_Tutorials
1
5
November 26, 2023
🌐
Wso2
security.docs.wso2.com › en › latest › security-guidelines › secure-engineering-guidelines › external-dependency-analysis-analysis-using-owasp-dependency-check
External Dependency Analysis Analysis using OWASP Dependency Check
In conclusion, before using an external library as a dependency for your project, it is important to know those are safe to use. You can simply use a tool like OWASP Dependency Check and do a vulnerability analysis for the 3rd party dependencies. You can follow this as a process in your organization to ensure that you do not use components with known vulnerabilities in your projects.
🌐
Jenkins
jenkins.io › doc › pipeline › steps › dependency-check-jenkins-plugin
OWASP Dependency-Check Plugin
With 9.0.0 dependency-check has moved from using the NVD data-feed to the NVD API.
🌐
Maven Repository
mvnrepository.com › artifact › org.owasp › dependency-check-cli
Maven Repository: org.owasp » dependency-check-cli
January 9, 2026 - dependency-check-cli is an command line tool that uses dependency-check-core to detect publicly disclosed vulnerabilities associated with the scanned project dependencies.
🌐
Gradle
plugins.gradle.org › plugin › org.owasp.dependencycheck › 5.0.0-M3.1
Gradle - Plugin: org.owasp.dependencycheck
Created 07 May 2019. A software composition analysis plugin that identifies known vulnerable dependencies used by the project. ... Adding the plugin to build logic for usage in precompiled script plugins. See the relevant documentation for more information. Add this plugin as a dependency to ...
🌐
Maven Central
central.sonatype.com › artifact › org.owasp › dependency-check-maven › 5.3.0
org.owasp:dependency-check-maven:5.3.0 - Maven Central
dependency-check-maven is a Maven Plugin that uses dependency-check-core to detect publicly disclosed vulnerabilities associated with the project's dependencies. The plugin will generate a report listing the dependency, any identified Common Platform Enumeration (CPE) identifiers, and the ...
Find elsewhere
🌐
Maven Central
central.sonatype.com › artifact › org.owasp › dependency-check-cli
dependency-check-cli - org.owasp - Maven Central - Sonatype
dependency-check-cli is an command line tool that uses dependency-check-core to detect publicly disclosed vulnerabilities associated with the scanned project dependencies. The tool will generate a report listing the dependency, any identified Common Platform Enumeration (CPE) identifiers, and ...
🌐
Gypsyengineer
blog.gypsyengineer.com › en › security › integrating-owasp-dependency-check.html
Integrating OWASP Dependency Check in to development process | The blog of a gypsy engineer
April 30, 2018 - OWASP Dependency Check is a well known open-source tool which can track dependencies in your project and identify components with known published vulnerabilities. The tool supports multiple languages and platforms such as Java, .NET, Ruby and Python. One of the simplest ways how you can use ...
🌐
Parasoft
parasoft.com › home › owasp dependency-check
OWASP Dependency-Check | Software Testing Glossary
November 20, 2025 - OWASP Dependency-Check identifies and manages software dependencies, ensuring applications are free from known security vulnerabilities.
🌐
Visual Studio Marketplace
marketplace.visualstudio.com › items
OWASP Dependency Check - Visual Studio Marketplace
August 6, 2019 - Extension for Azure DevOps - Dependency Check is a Software Composition Analysis (SCA) tool that attempts to detect publicly disclosed vulnerabilities contained within a project's dependencies.
🌐
DEV Community
dev.to › silentwatcher_95 › owasp-dependency-check-in-node-js-1oo6
OWASP Dependency Check in Node js 🛡️ - DEV Community
June 29, 2024 - Therefore, we need to check for security issues before adding or updating any dependencies in our project. OWASP Dependency Check is a tool that analyzes dependencies and checks for known issues.
🌐
Mend
mend.io › blog › application security › owasp dependency check: how does it work?
OWASP Dependency Check: How It Works, Pros, and Cons
January 6, 2026 - OWASP Dependency Check is a software composition analysis (SCA) tool designed to identify known vulnerabilities in project dependencies.
🌐
Medium
medium.com › @manas.pandey45 › owasp-dependency-check-882343a31b42
OWASP — Dependency check
February 10, 2024 - Here is a quick way on how to run it and how the results look, the check can be integrated with ... <plugin> <groupId>org.owasp</groupId> <artifactId>dependency-check-maven</artifactId> <version>9.0.9</version> <executions> <execution> <goals> <goal>check</goal> </goals> </execution> </executions> </plugin>
🌐
Dependency-check
dependency-check.github.io › DependencyCheck › dependency-check-gradle › index.html
Usage – dependency-check-maven
The OWASP dependency-check-gradle plugin provides monitoring of the projects dependent libraries; creating a report of known vulnerable components that are included in the build.
🌐
Maven Repository
mvnrepository.com › artifact › org.owasp › dependency-check-maven › 6.0.0
Maven Repository: org.owasp » dependency-check-maven » 6.0.0
September 7, 2020 - dependency-check-maven is a Maven Plugin that uses dependency-check-core to detect publicly disclosed vulnerabilities associated with the project's dependencies.
Published   Sep 07, 2020
Version   6.0.0
🌐
BeMyNet
bemynet.com › home › owasp dependency-check: how to find and fix vulnerable libraries
OWASP Dependency-Check: How to Find and Fix Vulnerable Libraries - BeMyNet
December 17, 2025 - OWASP Dependency-Check is a sophisticated SCA tool that identifies project dependencies and cross-references them against multiple vulnerability databases. Unlike basic version checkers, it performs fingerprinting analysis on actual dependency ...
🌐
Regulus
goregulus.com › home › owasp dependency-check: how it works, examples, and cra use cases
OWASP Dependency-Check: Complete Guide, Examples & CRA Alignment (2026)
January 30, 2026 - OWASP Dependency-Check is an open-source Software Composition Analysis (SCA) tool used to identify known vulnerabilities in third-party dependencies. It scans project dependencies against public vulnerability databases such as the NVD and produces ...
🌐
Medium
sudheer-baraker.medium.com › integrate-owasp-dependency-check-in-jenkins-pipeline-748d8aefc2b7
Integrate OWASP Dependency Check in Jenkins Pipeline | by Sudheer | Medium
October 7, 2023 - Identification of Vulnerabilities: Dependency-Check uses a combination of public and private vulnerability databases to identify known vulnerabilities in project dependencies. It supports various programming languages and package managers.