sbom.day

Software Bill of Materials — Daily Transparency

libc 2.36 (MIT) openssl 3.1.4 (Apache-2.0) zlib 1.3 (Zlib) node 20.11.0 (MIT) app 1.0.0 (Proprietary)

STEP 01

Identify Components

Inventory every library, framework, and dependency in your software. An SBOM starts with knowing exactly what you ship.

Packageexpress
Version4.18.2
LicenseMIT
Vuln StatusCLEAR
STEP 02

Map Dependencies

Trace the dependency tree. Direct dependencies are only the surface — transitive dependencies often carry the real risk.

Packagelodash
Version4.17.21
LicenseMIT
DepthTransitive (L3)
STEP 03

Assess Vulnerabilities

Cross-reference every component against CVE databases. Transparency means knowing your exposure before someone else discovers it.

Packagelog4j
Version2.14.1
CVECVE-2021-44228
SeverityCRITICAL
STEP 04

Automate and Monitor

An SBOM is not a one-time document. Integrate generation into CI/CD. Monitor continuously. Transparency is a daily practice.

FormatCycloneDX / SPDX
PipelineCI/CD Integrated
FrequencyEvery Build
StatusACTIVE