Open Source Audit Services

Our expert auditors perform technical due diligence audits using our Software Composition Analysis (SCA) toolset to deliver complete and trustworthy SBOM reports.
services overview

Open Source and Third Party Software Risk Audits

Ideal for M&A and corporate transactions, FossID Open Source Audits provide confidential, comprehensive, and precise open source software audits using our Software Composition Analysis (SCA) toolset and industry-leading OSS knowledge base.

FossID Open Source Audits result in a collection of comprehensive reports in industry-standard formats, granting full insight into open source components, files, and snippets along with their corresponding origins, copyrights and licenses, and security vulnerabilities.

Built for M&A Confidence

doc blue graph mag

Code Confidentiality

Our unique blind audit technique uses one-way hashing so you never transfer and expose your source code.

doc blue graph mag

Industry-Leading OSS Data

Audits leverage our massive knowledgebase of curated OSS intelligence for license compliance and security.

doc blue graph mag

Precise Snippet Detection

Find even the smallest fingerprint of copy-pasted open source code across all your codebase.

Actionable Reports for All Teams

img deep dive assessments

Executive Summary

High-level view of the Open-Source licensing and security vulnerability status of the audited software.

icon aligned best practices

NTIA-Compliant SBOMs

The industry standard for communicating the components, licenses, and copyrights associated with software packages.

findings recommendations

Vulnerability Report

Comprehensive list of all detected Common Vulnerabilities and Exposures (CVEs) and Common Platform Enumerations (CPEs).

Protect Your Source Code and IP

FossID creates a one-way hash of your code and does not need access to your source code. This unique process is ideal for open source software audits during M&A technical due diligence.

  • No source code exposure
    Ensuring maximum security and confidentiality.
  • No legal hassle
    Clean cut, easy process to get the job done.
  • No touch
    Conduct a blind audit, done remotely. No need to bring auditors on site.
shinobi blindfolded

The Blind Audit Process

Digital Fingerprints

Digital Fingerprints

Target company uses our utility to hash their code and securely upload to FossID datacenter.

Scan & Audit

Scan & Audit

Codebase’s fingerprints are scanned, audited, and all reports delivered for review.

Report Walk-Through

Report Walk-Through

Your FossID project leader leads a thorough walk-through of the audit results.

Open Source Insights

Sometimes you’re just not sure if a full in-depth audit is the right course of action. A FossID Open Source Insights service is a light-weight alternative. Similar to an audit, we perform a scan against the provided digital fingerprint of the codebase.

Upon completion of the scan, the results are reviewed by an open source auditor where false positives are eliminated, and licenses and versions are adjusted.

doc white graph mag flip
Streamline

Powered by the Industry-Leading OSS Intelligence Database

Our OSS intelligence database is maintained and curated by a dedicated research team. It covers over 3 Petabytes of software components coming from dozens of public sources and user contribution sites.

Software Components

Software Licenses

Vulnerable Snippets

Talk to a Software Supply Chain Ninja

Book a discovery call with one of our experts to discuss your business needs and how our tools and services can help.