Locate Vulnerable Deployed Artifacts
Sometimes, it is necessary to identify all instances of an artifact that has been deployed. For example, if a particular open source library that your application uses has been found to be vulnerable. This topic describes a method for locating artifacts using the Deploy command-line interface (CLI).