Building and Deploying Software Composition Analysis (SCA) for Enterprise Security

The article analyzes the rising threat of open‑source components, explains Software Composition Analysis (SCA) and SBOM generation, outlines the three‑stage process for building an in‑house SCA capability, discusses practical challenges such as data quality and integration, and looks ahead to future standards and open‑source tools.

Meituan Technology Team
Meituan Technology Team
Meituan Technology Team
Building and Deploying Software Composition Analysis (SCA) for Enterprise Security

1. Introduction

SCA (Software Composition Analysis) creates a fine‑grained Software Bill of Materials (SBOM) and matches it against vulnerability data to identify risky components. Commercial solutions include Blackduck, Snyk SCA, and Fortify SCA; open‑source options include OpenSCA.

2. Risk Landscape from a Security Viewpoint

2.1 Generic Vulnerability Risks

Synopsys (2021) reports that the proportion of open‑source repositories containing at least one vulnerability rose from 67 % in 2016 to 84 % in 2021, and high‑severity vulnerabilities increased from 53 % to 60 % over the same period. Snyk (2020) highlights XSS and command‑execution flaws as the most common.

2.2 Supply‑Chain Risks

The open‑source build‑publish pipeline mirrors a typical CI/CD flow: code is pushed to a VCS (GitHub, GitLab, etc.), dependencies are fetched from repositories (Nexus, Maven Central), artifacts are built and deployed (Docker images or JARs). Each stage can be compromised, e.g.:

IDE plugin poisoning : Snyk (May 2021) disclosed malicious VS Code extensions such as “LaTeX Workshop” and “Rainbow Fart”, installed millions of times.

Malicious code commits : In April 2021, a research team led by Prof. Kangjie Lu injected a backdoor into the Linux kernel, resulting in a university‑wide ban.

Git server compromise : In March 2021, PHP’s official Git repository received two forged commits signed as Rasmus Lerdorf and Nikita Popov.

Branch tampering : A 2019 DEFCON analysis of WebMin showed that unsigned branches from SourceForge introduced a high‑severity vulnerability absent from the GitHub release.

CI/CD compromise : The SolarWinds supply‑chain attack inserted a backdoor during the CI/CD stage, bypassing signature checks.

Insecure component inclusion : Python and Node.js ecosystems are frequent targets for malicious packages.

External CI/CD builds : Unverified JAR or Docker uploads bypass hash checks; research from Arizona (2008) showed many Linux package managers lack verification.

Direct deployment of compromised packages : The Web‑Browserify incident demonstrated how a widely‑used package can exfiltrate host information.

2.3 Risks of Using Out‑of‑Date Components

Legacy components suffer from maintenance gaps, missing security baselines (e.g., lack of stack‑canaries, DEP, ASLR), and insufficient testing, leading to “time‑bomb” vulnerabilities.

3. Business Perspective on Secure Development

Business teams care about compatibility, clear security‑version definitions, realistic risk quantification, and compliance with open‑source licenses. They often lack the expertise to evaluate component risk, relying on security teams to provide actionable guidance.

4. SCA Construction Process

SCA is not a new technology; its resurgence is driven by higher open‑source usage and DevSecOps adoption. Core functions identified from practice are:

Asset visibility : Catalog all applications, Hadoop jobs, Puppet services, etc., and map where SCA can be inserted.

Risk data discovery : Aggregate vulnerability feeds (NVD, CNVD, GHSA), internal threat‑intel, and NLP‑processed commit metadata.

Asset‑risk linking infrastructure : Provide APIs and plugins (e.g., for IDEs) to correlate assets with risk data.

Visualization : Dashboards that expose risk status, remediation progress, and enable business‑security collaboration.

The implementation is split into three stages:

Stage 1 – Data inventory : Joint effort between security and infrastructure teams to collect component inventories and build a dedicated open‑source risk database.

Stage 2 – SOP & PoC : Codify a standard operating procedure for vulnerability remediation, validate it with proof‑of‑concept runs, and expose core APIs to quality‑efficiency teams.

Stage 3 – Platformization : Automate the workflow, integrate with SOC platforms, and add health‑check mechanisms for high availability.

5. Problems Encountered During SCA Build

Lack of a mature vulnerability‑asset mapping standard : No industry‑wide equivalent of NVD’s CVE/CPE/CAPEC/CWE for component security, requiring custom rule design.

Data quality and pipeline reliability : Incomplete upstream collection, unstable data pipelines, and occasional loss of records affect CEP rule accuracy.

Risk‑data structure and accuracy : Converting heterogeneous, unstructured feeds via NLP introduces labeling errors and context‑sensitivity issues.

CI/CD governance and non‑standard assets : Need to support niche ecosystems (NuGet, Erlang, etc.) alongside mainstream stacks.

Asset‑visibility depth : While SCA can theoretically analyze nested FatJARs, practical limits require a “Maximum Tolerable Index” (MTI) to define acceptable granularity.

6. Future Outlook of SCA Technology

OpenSSF initiatives such as ScoreCard (2021) and AllStar provide baseline checks and scoring. Emerging standards like SLSA (Supply‑Chain Levels for Software Artifacts) guide end‑to‑end integrity. The roadmap emphasizes:

Finer‑grained asset and risk visibility.

Proactive detection and baseline compliance.

Integration with open‑source tools (Open Source Insight, OSV, Sigstore, Anchore, ChainGuard.dev).

Anticipated challenges include adversarial attempts to evade SCA scans and the need for lightweight, interoperable solutions that fit diverse enterprise infrastructures.

7. Conclusion

The accumulated experience shows that a successful SCA capability requires cross‑team collaboration, comprehensive data collection, robust pipelines, and continuous refinement. When fully realized, SCA enables a zero‑trust supply‑chain posture that secures the entire software lifecycle from code authoring to production deployment.

Original Source

Signed-in readers can open the original source through BestHub's protected redirect.

Sign in to view source
Republication Notice

This article has been distilled and summarized from source material, then republished for learning and reference. If you believe it infringes your rights, please contactadmin@besthub.devand we will review it promptly.

risk managementopen sourceNLPDevSecOpsSBOMsupply-chain securitySoftware Composition Analysis
Meituan Technology Team
Written by

Meituan Technology Team

Over 10,000 engineers powering China’s leading lifestyle services e‑commerce platform. Supporting hundreds of millions of consumers, millions of merchants across 2,000+ industries. This is the public channel for the tech teams behind Meituan, Dianping, Meituan Waimai, Meituan Select, and related services.

0 followers
Reader feedback

How this landed with the community

Sign in to like

Rate this article

Was this worth your time?

Sign in to rate
Discussion

0 Comments

Thoughtful readers leave field notes, pushback, and hard-won operational detail here.