Getting Started
Last updated
Was this helpful?
Last updated
Was this helpful?
Before you dive into the documentation, please take a minute to understand how our docs are structured.
Our documentation will guide you through the process to get you up and running with Threatrix scans ASAP. The goal is to start with simple tasks and build upon that foundation towards full integration and automation.
is the dashboard that allows you to review your project scan results, fix vulnerabilities, and administer the platform. You must create an account or be invited by another user to access Threat Center.
Threatrix is a command line tool useful for automating your scans from within your DevOps processes. It seamlessly integrates with your build server to effectuate scans and enforce policies as they apply to your build.
Start here when you are ready to get started with full scan automation. We make it easy to integrate our into any build environment to automate your project scans quickly.
allow your legal and security teams to enforce the governing rules within your Organization, Entity, or Project. Policies drive actions like Alerts, build failures, component version changes, and automated license annotation.
If you hold administrative supers powers, this is your secret lair. You have the power to add and remove users, modify permissions and build customer roles in . You can also create and manage the entities and administer notification settings.