Skip to main content

One doc tagged with "audit"

View all tags

Locate Vulnerable Deployed Artifacts

Sometimes, it is necessary to identify all instances of an artifact that has been deployed. For example, if a particular open source library that your application uses has been found to be vulnerable. This topic describes a method for locating artifacts using the Deploy command-line interface (CLI).