Threatrix Documentation
Threatrix
  • Getting Started
  • Developer Quick Start
  • SecureShip
    • Artifactory Scanning
    • ThreatAgent Scanning
  • Threat Center
    • Creating Account
      • OAuth Login
    • Entity Dashboard
    • User Profile
  • AICertify
    • Reviewing Results
  • codecertify
    • Quick Start
    • Project Summary Tab
    • Components Tab
      • Custom Components
        • Adding
        • Editing
        • Important Notes
      • Header Panel
      • Module Tree Panel
      • Results Panel
        • Card View
        • Risk Graph View
      • Audit History
    • Assets Tab
      • Custom Asset Matches
        • Adding Asset Match
  • securecore
    • Project Dashboard
    • ThreatScan
    • Scan Results
  • Threat Agent
    • Threat Agent Overview
    • Threat Agent - Installation & Scanning
    • Scan Summary Reports
    • Resolving Errors
    • Scanning Container Images
  • Integrations
    • Dependency Managers
      • RENV
    • Build Integrations
      • AWS CodeBuild
      • Azure DevOps
      • Bitbucket Pipeline
      • CircleCI
      • GitHub Action
      • GitLab Pipeline
      • Jenkins Pipeline
    • SCM Integrations
      • GitLab
      • Bitbucket
    • Issue Management
      • Jira
    • Notifications
  • Policy Management
    • Policy Overview
    • Creating Policies
    • Policy Conditions
    • Policy Actions
    • Policy Scopes
  • Administration
    • User Management
    • Organization Settings
      • Organization Knowledge Base
      • Integration
        • Slack Integration
        • Jira Integration
        • Service Keys
    • RBAC
    • Entity Management
    • Okta
      • Okta Org2Org Integration
  • GraphQL API
    • API Overview
  • Resources
    • Dependency Managers
      • PIP
    • Dictionary
    • Licenses
    • Security & Privacy
    • Binary File Support
  • Hybrid / On Premise
    • Getting Started
    • Installation
    • Upgrade
    • Setup
    • Cloud Data Disclosure
    • Troubleshooting
Powered by GitBook
On this page
  • Scan Data Collection
  • Threat Agent Data Collection
  • ThreatScan Data Collection

Was this helpful?

  1. Resources

Security & Privacy

Personally Identifiable Information

Scan Data Collection

Threat Agent Data Collection

During scans that occur while using Threat Agent, will collect the following data.

  • Dependency manager files

  • File Metadata

    • File name

    • File size

    • File locations relative to the root of the project

  • Whole file SHA1 signatures

  • File DNA signatures(As part of TrueMatch)

Threat Agent does not collect or transmit your source code to our server during standard scans.

SOURCE CODE will be collected and transmitted to our server if you select the --cloud-scan option when launching Threat Agent.

ThreatScan Data Collection

ThreatScan integrates directly with your authorized SCM; Github, Gitlab, or Bitbucket. During scans, a copy of your code is transmitted to our scan server, processed, and then destroyed. No copy of your code ever remains on our servers.

PreviousLicensesNextBinary File Support

Last updated 2 months ago

Was this helpful?