Skip to content

Commit f50bd05

Browse files
authored
Merge pull request #1084 from blackducksoftware/cp_IDETECT-4274_doc
Cp idetect 4274 doc
2 parents e42f6d8 + 1f14574 commit f50bd05

File tree

6 files changed

+74
-30
lines changed

6 files changed

+74
-30
lines changed

documentation/keywords.ditamap

+1
Original file line numberDiff line numberDiff line change
@@ -6,6 +6,7 @@
66
<keydef keys="division_name"><topicmeta><keywords><keyword>SIG</keyword></keywords></topicmeta></keydef>
77
<keydef keys="binary_repo_type"><topicmeta><keywords><keyword>Artifactory</keyword></keywords></topicmeta></keydef>
88
<keydef keys="solution_name"><topicmeta><keywords><keyword>Detect</keyword></keywords></topicmeta></keydef>
9+
<keydef keys="threat_intel"><topicmeta><keywords><keyword>ReversingLabs</keyword></keywords></topicmeta></keydef>
910
<keydef keys="source_project_name"><topicmeta><keywords><keyword>synopsys-detect</keyword></keywords></topicmeta></keydef>
1011
<keydef keys="bash_script_name"><topicmeta><keywords><keyword>detect9.sh</keyword></keywords></topicmeta></keydef>
1112
<keydef keys="powershell_script_name"><topicmeta><keywords><keyword>detect9.ps1</keyword></keywords></topicmeta></keydef>

documentation/src/main/markdown/components/tools.md

+1
Original file line numberDiff line numberDiff line change
@@ -13,5 +13,6 @@ value specified in parentheses are:
1313
* [Vulnerability Impact Analysis Tool](../runningdetect/basics/runningwithblackduck.md) (--detect.tools=IMPACT_ANALYSIS)
1414
* [IaC Scanner](../runningdetect/basics/runningwithblackduck.md) (--detect.tools=IAC_SCAN)
1515
* [Container Scan](../runningdetect/containerscanning.md) (--detect.tools=CONTAINER_SCAN)
16+
* [ReversingLabs Scan](../runningdetect/threatintelscan.md) (--detect.tools=THREAT_INTEL)
1617

1718
The detector tool runs any applicable [detectors](../components/detectors.dita).

documentation/src/main/markdown/currentreleasenotes.md

+2-10
Original file line numberDiff line numberDiff line change
@@ -3,14 +3,6 @@
33
## Version 9.6.0
44

55
### New features
6-
*
6+
* ReversingLabs Scans - this new feature provides analysis of software packages for file-based malware threats.
7+
See [ReversingLabs Scans](runningdetect/threatintelscan.md) for further information.
78

8-
### Changed features
9-
*
10-
11-
### Resolved issues
12-
*
13-
14-
### Dependency updates
15-
16-
*

documentation/src/main/markdown/introduction.md

+8-5
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22

33
[company_name] [solution_name] is an intelligent scan client that analyzes code in your projects and associated folders to perform compositional analysis. [company_name] [solution_name] can be configured to send scan results to [blackduck_product_name], which generates risk analysis when identifying open-source components, licenses, and security vulnerabilities.
44

5-
[company_name] [solution_name] can be used in both connected and air gap modes.  
5+
[company_name] [solution_name] can be used in both connected and air gap modes depending on the types of scans being run.
66

77
## [company_name] [solution_name] has the following characteristics.
88

@@ -14,7 +14,7 @@
1414

1515
* Runs on Windows, Linux, and macOS. It is available through GitHub, under the permissive Apache License, Version 2.0 and does not require pre-installation or extensive configuration.
1616

17-
* Supports scanning Docker images by identifying open-source libraries and code within the images, using both signature scanning and the package manager analysis techniques.  
17+
* Supports scanning Docker images by identifying open-source libraries and code within the images, using both signature scanning and the package manager analysis techniques.
1818

1919
## [company_name] [solution_name] functionality consolidation.
2020

@@ -34,7 +34,11 @@
3434

3535
* Calculate security vulnerability risk in your code.
3636

37-
* Produce reports of the open-source analysis findings.  
37+
* Produce reports of the open-source analysis findings.
38+
39+
* Provide malware information if identified.
40+
41+
<note type="note">Some scan types require specific feature licenses to execute. Contact your [company_name] representative for further information.</note>
3842

3943
## How [company_name] [solution_name] functions.
4044

@@ -46,5 +50,4 @@ When looking at vulnerabilities in open source and third-party software, [compan
4650

4751
* Uploads both sets of results (dependency details) to [blackduck_product_name] creating the project/version if it does not already exist. [blackduck_product_name] uses the uploaded dependency information to build the Bill Of Materials (BOM) for the project/version.
4852

49-
* You can view the output and analysis results in [blackduck_product_name].  
50-
53+
* You can view the output and analysis results in [blackduck_product_name].
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,46 @@
1+
# [threat_intel] Scan
2+
3+
[threat_intel] Scans are a way of running binary file analysis that provides malware warnings, with a risk analysis level applied, for open source and commercial software.
4+
5+
[company_name] [solution_name] will accept a user provided local file path to a binary file for [threat_intel] Scan. This file may be a single executable, or a compressed file, such as a tar or zip, that contains many files for analysis.
6+
7+
Identification of malware displayed to [blackduck_product_name] users will include file name, file path, and other identifiers, along with a description of the type of malware, and severity of the findings.
8+
9+
## Workflow
10+
11+
1. The file for scanning is uploaded to [blackduck_product_name] Storage service by [company_name] [solution_name].
12+
1. Once uploaded, [threat_intel] service takes the file from Storage service and downloads it to its own container.
13+
1. The [threat_intel] service invokes [threat_intel] tools to extract any archived files and generate file hashes.
14+
1. [threat_intel] sends the SHA-1 hash of the uploaded file, along with hashes, and their size in bytes, of files extracted from any archives.
15+
1. Once complete, a report in JSON format is sent back to [threat_intel] service, which is then forwarded to [blackduck_product_name] Scan service. This report is saved in the [blackduck_product_name] database.
16+
<note type="note">The scanned file is removed from Storage service when the scan completes, and [threat_intel] service does not persist any data for this file.</note>
17+
18+
## Requirements and Limitations
19+
20+
### General Requirements
21+
* [blackduck_product_name] server must have the appropriate [threat_intel] license.
22+
* [company_name] [solution_name] 9.6.0 or greater.
23+
* Must be running [blackduck_product_name] 2024.4.0 or greater.
24+
* The [threat_intel] service container (rl-service) must be running.
25+
* [threat_intel] scans require network connectivity (Air gap mode is not supported).
26+
* [threat_intel] scan does not provide project and version name defaults so you need to set project and version names via properties when [threat_intel] is the only tool invoked. (If the specified project or version does not exist in [blackduck_product_name], it will be created.)
27+
28+
### Limitations
29+
* [threat_intel] Scan is limited to images of 5GB or less for hosted services.
30+
* [threat_intel] Scan is limited to images of 6GB or less for local, on-prem services.
31+
32+
## Invocation
33+
To invoke a [threat_intel] scan, which only executes in "Intelligent" mode, the following must be provided at a minimum in addition to [blackduck_product_name] Server related configuration properties:
34+
```
35+
--detect.tools=THREAT_INTEL
36+
--detect.threatintel.scan.file.path=<Path to local binary file>
37+
--detect.project.name=<Use existing or set as a value to be created>
38+
--detect.project.version.name=<Use existing or set as a value to be created>
39+
```
40+
41+
## Results
42+
43+
[threat_intel] scan findings will appear in the [blackduck_product_name] user interface under the **Malware** tab. Further information on viewing [threat_intel] results is available [here](https://sig-product-docs.synopsys.com/bundle/bd-hub/page/ComponentDiscovery/aboutReversinglabsScanning.html)
44+
45+
## Further information
46+
For additional information regarding the related properties, see [threat-intel](../properties/configuration/threat-intel.md)

documentation/topics.ditamap

+16-15
Original file line numberDiff line numberDiff line change
@@ -34,17 +34,17 @@
3434
<topicref href="gettingstarted/quickstart.md" format="markdown"/>
3535
<topicref href="gettingstarted/overview.md" format="markdown">
3636
<topicref href="gettingstarted/terms/intro.md" format="markdown">
37-
<topicref href="gettingstarted/terms/sca.md" format="markdown"/>
38-
<topicref href="gettingstarted/terms/run.md" format="markdown"/>
39-
<topicref href="gettingstarted/terms/script.md" format="markdown"/>
40-
<topicref href="gettingstarted/terms/jar.md" format="markdown"/>
41-
<topicref href="gettingstarted/terms/tools.md" format="markdown"/>
37+
<topicref href="gettingstarted/terms/bdio.md" format="markdown"/>
4238
<topicref href="gettingstarted/terms/detectors.md" format="markdown"/>
43-
<topicref href="gettingstarted/terms/properties.md" format="markdown"/>
39+
<topicref href="gettingstarted/terms/impactanalysis.md" format="markdown"/>
4440
<topicref href="gettingstarted/terms/inspectors.md" format="markdown"/>
41+
<topicref href="gettingstarted/terms/jar.md" format="markdown"/>
42+
<topicref href="gettingstarted/terms/properties.md" format="markdown"/>
43+
<topicref href="gettingstarted/terms/run.md" format="markdown"/>
44+
<topicref href="gettingstarted/terms/sca.md" format="markdown"/>
4545
<topicref href="gettingstarted/terms/scans.md" format="markdown"/>
46-
<topicref href="gettingstarted/terms/bdio.md" format="markdown"/>
47-
<topicref href="gettingstarted/terms/impactanalysis.md" format="markdown"/>
46+
<topicref href="gettingstarted/terms/script.md" format="markdown"/>
47+
<topicref href="gettingstarted/terms/tools.md" format="markdown"/>
4848
</topicref>
4949
<topicref href="gettingstarted/howitworks.md" format="markdown"/>
5050
<topicref href="gettingstarted/workflow.md" format="markdown"/>
@@ -87,17 +87,18 @@
8787
<topicref href="runningdetect/includingexcluding/pkgmgrs.md" format="markdown"/>
8888
<topicref href="runningdetect/includingexcluding/directories.md" format="markdown"/>
8989
</topicref>
90+
<topicref href="runningdetect/component-location-analysis.md" format="markdown"/>
91+
<topicref href="runningdetect/concurrent.md" format="markdown"/>
92+
<topicref href="runningdetect/containerscanning.md" format="markdown"/>
9093
<topicref href="runningdetect/detectorcascade.md" format="markdown"/>
91-
<topicref href="runningdetect/statelessscan.md" format="markdown"/>
92-
<topicref href="runningdetect/rapidscan.md" format="markdown"/>
9394
<topicref href="runningdetect/iacscan.md" format="markdown"/>
94-
<topicref href="runningdetect/runningairgap.md" format="markdown"/>
95-
<topicref href="runningdetect/status-file.md" format="markdown"/>
9695
<topicref href="runningdetect/proxies.md" format="markdown"/>
97-
<topicref href="runningdetect/concurrent.md" format="markdown"/>
98-
<topicref href="runningdetect/containerscanning.md" format="markdown"/>
96+
<topicref href="runningdetect/rapidscan.md" format="markdown"/>
9997
<topicref href="runningdetect/runincontainer.md" format="markdown"/>
100-
<topicref href="runningdetect/component-location-analysis.md" format="markdown"/>
98+
<topicref href="runningdetect/runningairgap.md" format="markdown"/>
99+
<topicref href="runningdetect/statelessscan.md" format="markdown"/>
100+
<topicref href="runningdetect/status-file.md" format="markdown"/>
101+
<topicref href="runningdetect/threatintelscan.md" format="markdown"/>
101102
</topicref>
102103
<topicref href="components/overview.md" format="markdown">
103104
<topicref href="components/tools.md" format="markdown"/>

0 commit comments

Comments
 (0)