Locate vulnerable deployed artifacts
This topic describes a method for identifying all instances of a deployed artifact, which is useful, for example, if a particular open-source library used by your application is found to be vulnerable.
This topic describes a method for identifying all instances of a deployed artifact, which is useful, for example, if a particular open-source library used by your application is found to be vulnerable.