Threatrix Documentation
Threatrix
  • Getting Started
  • Developer Quick Start
  • SecureShip
    • Artifactory Scanning
    • ThreatAgent Scanning
  • Threat Center
    • Creating Account
      • OAuth Login
    • Entity Dashboard
    • User Profile
  • AICertify
    • Reviewing Results
  • codecertify
    • Quick Start
    • Project Summary Tab
    • Components Tab
      • Custom Components
        • Adding
        • Editing
        • Important Notes
      • Header Panel
      • Module Tree Panel
      • Results Panel
        • Card View
        • Risk Graph View
      • Audit History
    • Assets Tab
      • Custom Asset Matches
        • Adding Asset Match
  • securecore
    • Project Dashboard
    • ThreatScan
    • Scan Results
  • Threat Agent
    • Threat Agent Overview
    • Threat Agent - Installation & Scanning
    • Scan Summary Reports
    • Resolving Errors
    • Scanning Container Images
  • Integrations
    • Dependency Managers
      • RENV
    • Build Integrations
      • AWS CodeBuild
      • Azure DevOps
      • Bitbucket Pipeline
      • CircleCI
      • GitHub Action
      • GitLab Pipeline
      • Jenkins Pipeline
    • SCM Integrations
      • GitLab
      • Bitbucket
    • Issue Management
      • Jira
    • Notifications
  • Policy Management
    • Policy Overview
    • Creating Policies
    • Policy Conditions
    • Policy Actions
    • Policy Scopes
  • Administration
    • User Management
    • Organization Settings
      • Organization Knowledge Base
      • Integration
        • Slack Integration
        • Jira Integration
        • Service Keys
    • RBAC
    • Entity Management
    • Okta
      • Okta Org2Org Integration
  • GraphQL API
    • API Overview
  • Resources
    • Dependency Managers
      • PIP
    • Dictionary
    • Licenses
    • Security & Privacy
    • Binary File Support
  • Hybrid / On Premise
    • Getting Started
    • Installation
    • Upgrade
    • Setup
    • Cloud Data Disclosure
    • Troubleshooting
Powered by GitBook
On this page
  • What are Custom Components
  • How are Custom Components Used
  • Important Notes

Was this helpful?

  1. codecertify
  2. Components Tab

Custom Components

PreviousComponents TabNextAdding

Last updated 2 months ago

Was this helpful?

What are Custom Components

Custom components allow organizations to create and maintain a private knowledge base of component artifacts with their associated meta data such as versions, licenses and copyrights.

How are Custom Components Used

Custom Components can be used to automatically associate Custom Component data with components that were unmatched during a scan.

Unmatched components happen for a variety of reasons, but your team may still need to account for an artifact that was unmatched by Threatrix. This is where Custom Components comes in handy.

Custom Components are first class components that contain all of the necessary data that your team will need to account for any risk associated with the unmatched artifact, including licenses, copyrights and vulnerabilities. All of this data will be present on reports and risk management tools such SecureCore and Artifact Risk Graph(ARG).

Important Notes

Please read and understand some regarding the creation, administration and application of Custom Components.

Important Notes