Latest version: v3.0.0.dev3
The information on this page was curated by experts in our Cybersecurity Intelligence Team.
Document the provenance (origin and license) of third-party software using small text files. Collect inventories, generate attribution documentation.
No known vulnerabilities found