npx claudepluginhub agentsecops/secopsagentkit --plugin offsec-skillsThis skill uses the workspace's default tool permissions.
Perform comprehensive Software Composition Analysis (SCA) using Synopsys Black Duck to identify
assets/blackduck_config.ymlassets/ci-config-template.ymlassets/ci_integration/github_actions.ymlassets/ci_integration/gitlab_ci.ymlassets/ci_integration/jenkins_pipeline.groovyassets/policy_templates/security_policy.jsonassets/rule-template.yamlreferences/EXAMPLE.mdreferences/WORKFLOW_CHECKLIST.mdreferences/cve_cwe_owasp_mapping.mdreferences/license_risk_guide.mdreferences/remediation_strategies.mdreferences/supply_chain_threats.mdCompares coding agents like Claude Code and Aider on custom YAML-defined codebase tasks using git worktrees, measuring pass rate, cost, time, and consistency.
Designs and optimizes AI agent action spaces, tool definitions, observation formats, error recovery, and context for higher task completion rates.
Designs, implements, and audits WCAG 2.2 AA accessible UIs for Web (ARIA/HTML5), iOS (SwiftUI traits), and Android (Compose semantics). Audits code for compliance gaps.
Perform comprehensive Software Composition Analysis (SCA) using Synopsys Black Duck to identify security vulnerabilities, license compliance risks, and supply chain threats in open source dependencies. This skill provides automated dependency scanning, vulnerability detection with CVE mapping, license risk analysis, and remediation guidance aligned with OWASP and NIST standards.
Scan a project for dependency vulnerabilities:
# Using Black Duck Detect (recommended)
bash <(curl -s -L https://detect.synopsys.com/detect.sh) \
--blackduck.url=$BLACKDUCK_URL \
--blackduck.api.token=$BLACKDUCK_TOKEN \
--detect.project.name="MyProject" \
--detect.project.version.name="1.0.0"
Scan with policy violation enforcement:
# Fail build on policy violations
bash <(curl -s -L https://detect.synopsys.com/detect.sh) \
--blackduck.url=$BLACKDUCK_URL \
--blackduck.api.token=$BLACKDUCK_TOKEN \
--detect.policy.check.fail.on.severities=BLOCKER,CRITICAL
Progress:
[ ] 1. Identify package managers and dependency manifests in codebase
[ ] 2. Run scripts/blackduck_scan.py with project detection
[ ] 3. Analyze vulnerability findings categorized by severity (CRITICAL, HIGH, MEDIUM, LOW)
[ ] 4. Map CVE findings to CWE and OWASP Top 10 categories
[ ] 5. Review license compliance risks and policy violations
[ ] 6. Generate prioritized remediation report with upgrade recommendations
Work through each step systematically. Check off completed items.
references/remediation_strategies.md for vulnerability-specific guidanceassets/ci_integration/Sensitive Data Handling: Black Duck scans require API tokens with read/write access. Store credentials securely in secrets management (Vault, AWS Secrets Manager). Never commit tokens to version control.
Access Control: Limit Black Duck access to authorized security and development teams. Use role-based access control (RBAC) for scan result visibility and policy management.
Audit Logging: Log all scan executions with timestamps, user, project version, and findings count for compliance auditing. Enable Black Duck's built-in audit trail.
Compliance: SCA scanning supports SOC2, PCI-DSS, GDPR, and HIPAA compliance by tracking third-party component risks. Generate SBOM for regulatory requirements.
Safe Defaults: Configure policies to fail builds on CRITICAL and HIGH severity vulnerabilities. Use allowlists sparingly with documented business justification.
Black Duck Detect automatically identifies and scans:
scripts/blackduck_scan.py - Full-featured scanning with CVE/CWE mapping and reportingscripts/analyze_results.py - Parse Black Duck results and generate remediation reportscripts/sbom_generator.sh - Generate SBOM (CycloneDX/SPDX) from scan resultsscripts/policy_checker.py - Validate compliance with organizational security policiesreferences/cve_cwe_owasp_mapping.md - CVE to CWE and OWASP Top 10 mappingreferences/remediation_strategies.md - Vulnerability remediation patterns and upgrade strategiesreferences/license_risk_guide.md - License compliance risk assessment and legal guidancereferences/supply_chain_threats.md - Common supply chain attack patterns and mitigationsassets/ci_integration/github_actions.yml - GitHub Actions workflow for Black Duck scanningassets/ci_integration/gitlab_ci.yml - GitLab CI configuration for SCAassets/ci_integration/jenkins_pipeline.groovy - Jenkins pipeline with Black Duck integrationassets/policy_templates/ - Pre-configured security and compliance policiesassets/blackduck_config.yml - Recommended Black Duck Detect configuration# Run comprehensive scan and generate SBOM
scripts/blackduck_scan.py \
--project "MyApp" \
--version "1.0.0" \
--output results.json \
--generate-sbom \
--severity CRITICAL HIGH
# Scan PR changes, fail on new high-severity vulnerabilities
bash <(curl -s -L https://detect.synopsys.com/detect.sh) \
--blackduck.url=$BLACKDUCK_URL \
--blackduck.api.token=$BLACKDUCK_TOKEN \
--detect.policy.check.fail.on.severities=CRITICAL,HIGH \
--detect.wait.for.results=true
# Generate license compliance report
scripts/blackduck_scan.py \
--project "MyApp" \
--version "1.0.0" \
--report-type license \
--output license-report.pdf
# Extract CVE details and remediation guidance
scripts/analyze_results.py \
--input scan-results.json \
--filter-severity CRITICAL HIGH \
--include-remediation \
--output vulnerability-report.md
# Generate Software Bill of Materials (CycloneDX format)
scripts/sbom_generator.sh \
--project "MyApp" \
--version "1.0.0" \
--format cyclonedx \
--output sbom.json
synopsys-sig/detect-action@v1 with policy enforcementSee assets/ci_integration/ for ready-to-use pipeline configurations.
Black Duck classifies vulnerabilities by CVSS score and severity:
assets/policy_templates/# Enforce custom policy during scan
bash <(curl -s -L https://detect.synopsys.com/detect.sh) \
--blackduck.url=$BLACKDUCK_URL \
--blackduck.api.token=$BLACKDUCK_TOKEN \
--detect.policy.check.fail.on.severities=BLOCKER,CRITICAL \
--detect.wait.for.results=true
For large projects with many dependencies:
# Use intelligent scan mode (incremental)
bash <(curl -s -L https://detect.synopsys.com/detect.sh) \
--detect.detector.search.depth=3 \
--detect.blackduck.signature.scanner.snippet.matching=SNIPPET_MATCHING \
--detect.parallel.processors=4
# Exclude test and development dependencies
bash <(curl -s -L https://detect.synopsys.com/detect.sh) \
--detect.excluded.detector.types=PIP,NPM_PACKAGE_LOCK \
--detect.npm.include.dev.dependencies=false
Solution:
Solution:
references/license_risk_guide.md for risk assessmentSolution:
--detect.detector.search.depth to increase search depthSolution:
--detect.parallel.processors for multi-core systemsFor detailed vulnerability research, consult references/remediation_strategies.md.
Key remediation strategies:
See references/supply_chain_threats.md for comprehensive coverage of:
Black Duck supports standard SBOM formats:
Use SBOMs for: