Comment on page
with Security Scanning, Mapping, Rating and Data Analysis.
The Cyberfame WebApp is designed to provide a user-friendly interface to get started with asynchronous, parallel security reconnaissance and supply network analysis for technical and non-technical users.
This guide will help you get started with Cyberfame's WebApp and Advanced Features.
Use the email or SSO account for your subscription you intend to use with the application. We do not yet support account merging, If you accidentally subscribed with the wrong email, get [email protected]
For Security reasons, you'll receive an email link every time you log into the platform and can not set a password.
Start by submitting one or more domains or repositories for supply chain security analysis.
Please note that Cyberfame treats any domain entered as a root domain. This means that if you enter
www.example.com, Cyberfame will analyze subdomains of
Cyberfame uses a growing set of security scanning tools to gather data on your assets and generate a dynamic graph, allowing you to explore and analyze your supply network.
Cyberfame's WebApp conducts security analysis of your supply chain through asynchronous and parallel scanning. The scanning methods automate the analysis on these key security risk areas:
- 1.Repository and Web Application Security RisksFor GitHub Repositories and Web Assets:
- Dynamic SBOMs: Combines SAST, DAST, and SBOM scanning to create dynamic Software Bill of Materials, identifying vulnerabilities, outdated components, and license compliance issues in real-time. SBOM Explained by Linux Foundation
- 2.Web Application Security RisksFor Web Assets:
Cyberfame's WebApp abstracts all collected data into a security rating for each analyzed asset based on the results of the security scans. This rating considers factors such as:
After the analysis process is complete, you'll be notified. The supply graph will display various nodes and connections, highlighting potential vulnerabilities, dependencies, and the results of scanning, mapping and rating your supply graph. Take some time to navigate the graph and familiarize yourself with the visualizations.
Cyberfame graphs display nodes and connections, with color-coding security ratings, vulnerabilities, dependencies, and other key data points.
For example, you can use graph theoretical algorithms for path search, connectivity, centrality and the built-in query language to answer a combination of questions like:
"Which are our organizations most connected and least protected dependency?"
"Which of those dependencies have known vulnerabilities?"
The results can be visualized and shared with your team within the WebApp:
Now that you have a basic understanding of Cyberfame, you can explore the rest of the technical documentation to learn more about specific features, use cases, and best practices.