Curated catalog of pre-vetted components
Developers pick from a vetted list rather than reaching into the public registry. The dependency surface narrows to libraries the program is willing to depend on.
OpenText • Application security
Core Open Source Select is a curated open-source component catalog with pre-vetted dependency selection. It moves OSS governance from scan-time detection to sourcing-time control, screening libraries against vulnerability history, license clarity, and project hygiene before they enter the dependency tree.
When Merito stands up Core Open Source Select, the engagement defines the curated catalog scope, designs the catalog-restriction policy, and pairs it with Core SCA so the AppSec program runs sourcing-time curation alongside detection-time scanning rather than letting either run alone.
What it is
Core Open Source Select is the sourcing-time OSS curation product inside the OpenText AppSec line. Where Core SCA detects vulnerabilities and license risk in dependencies that are already in the build, Open Source Select runs upstream of that: a curated catalog of pre-vetted OSS components developers can pick from, with vulnerability history, license posture, project hygiene, and known-bad indicators evaluated before adoption. Programs that consume Open Source Select narrow the dependency surface to libraries the program is willing to depend on.
Comparison to Checkmarx Repository Health is fair. Both products operate in the sourcing-time governance space, scoring OSS projects before they enter the dependency tree. Open Source Select takes the curated-catalog shape (here is a vetted list, pick from it); Repository Health takes the scoring-engine shape (here is a score, gate against it). Programs picking Open Source Select are picking the catalog discipline; programs picking Repository Health are picking the score discipline. Both are valid and address the same risk from different angles.
The pairing with Core SCA is the load-bearing move on layered governance. Open Source Select narrows the front-end (what enters the dependency tree); Core SCA evaluates the back-end (what risk exists in dependencies that did enter). Programs running both run prevention plus detection; programs running only Core SCA do detection without prevention. The right shape depends on whether the program has the operational maturity to enforce sourcing decisions versus only react to detected risk.
What disrupts Open Source Select adoption is treating it as an OSS-license scanner. The product's value is the curation discipline: developers pick from a vetted catalog rather than reaching into the public registry directly. Programs that license Open Source Select but never restrict developers to the catalog get the catalog without the discipline, and the program does sourcing-time governance in name only. Merito's engagement defines the catalog-restriction policy, the override workflow for legitimate exceptions, and the developer enablement that turns the catalog into a real sourcing discipline.
Ideal use cases
What it is best at
Developers pick from a vetted list rather than reaching into the public registry. The dependency surface narrows to libraries the program is willing to depend on.
Operates upstream of Core SCA. Programs that catch unhealthy dependencies before they enter the build spend a fraction of the operational effort that detection-only programs do.
Curation feeds into Core SCA detection so AppSec runs layered governance: prevention at sourcing, detection at scan time.
Catalog evaluations include license clarity, attribution requirements, and project provenance. Programs subject to OSS-license audits get sourcing-side rigor.
When a developer needs a library outside the catalog, the override workflow captures rationale, reviewer, and expiry. Sourcing decisions become defensible.
Core capabilities
What Open Source Select actually delivers as a sourcing-time control.
Curated component catalog
Vetted list of OSS components developers can pick from, with vulnerability history, license posture, and project hygiene evaluated.
Project hygiene scoring
Maintenance frequency, contributor diversity, vulnerability response time, and provenance signals attached to each catalog entry.
License-clarity evaluation
License obligations, attribution requirements, and compatibility analysis on every catalog component.
Continuous re-evaluation
Catalog entries get re-evaluated as new CVEs surface, project signals shift, or licenses change. Stale entries get demoted.
Turning the catalog into enforceable sourcing decisions.
Catalog-restriction policy
Configurable policy that restricts developers to the catalog for new dependencies. Existing dependencies grandfathered.
Override workflow with audit trail
When a developer needs a library outside the catalog, the override workflow captures rationale, reviewer, and expiry.
PR-time integration
Sourcing-policy enforcement at PR time when new dependencies appear in a manifest change.
Open Source Select output flowing into the AppSec backlog with the rest of the OpenText AppSec line.
Cross-product correlation with Core SCA
Catalog selection feeds Core SCA detection for layered prevention-plus-detection governance.
Compliance reporting
Audit-ready evidence for OSS-provenance requirements in federal, healthcare, and financial-services programs.
GRC and OSS-license-management integration
Catalog and override data flowed into internal GRC platforms.
Where it fits in the stack
Deployment and implementation
Licensing and packaging
Core Open Source Select
Standard SaaS curated-catalog edition.
Best for: Programs adding sourcing-time OSS governance to an existing AppSec footprint.
Core Open Source Select with Core SCA
Bundled with Core SCA for layered sourcing-plus-detection governance.
Best for: Programs running both prevention and detection on OSS risk.
Merito services
Merito sells licenses and the delivery work around them. Pick the service that matches where you are in the lifecycle.
Catalog scoping, catalog-restriction policy design, override workflow setup, CI/CD integration.
Explore service02OSS sourcing governance scoping for Open Source Select alongside Checkmarx Repository Health and OSSF Scorecard.
Explore service03Sourcing-policy enforcement integrated into PR-time CI and source-control review.
Explore service04Developer enablement around curated-catalog discipline and override accountability.
Explore service05Named engineer, priority SLAs, and release-time coverage for Open Source Select.
Explore service06Long-term run support including catalog-policy maintenance, override-workflow operation, and reporting evolution.
Explore service07Role-based training for AppSec architects, DevSecOps owners, and engineering leads.
Explore service08Merito-placed AppSec engineers and OpenText specialists embedded on long-running programs.
Explore serviceOpenText Core Open Source Select licensing
Open Source Select pricing arrives with catalog scoping, catalog-restriction policy design, override-workflow setup, and CI/CD integration that turn sourcing-time curation into enforceable governance rather than a recommendation engine nobody enforces.
Merito point of view
Merito has audited OSS programs that ran rigorous Core SCA detection and never asked which dependencies were entering the tree in the first place. The result is a triage queue that grows faster than it drains. Open Source Select inverts the math by curating the front end: developers pick from a vetted catalog, the dependency surface narrows, and the SCA backlog reflects a smaller, defensible set of libraries.
Merito recommends Open Source Select specifically when the program has the operational maturity to enforce a curated catalog, when regulated workloads require provenance evidence at sourcing time, and when developer enablement is in scope. For programs without the operational maturity to restrict developers to a catalog, Open Source Select still works as a recommendation engine but the discipline is muted. Merito surfaces that during scoping rather than overselling sourcing governance the program will not enforce.
Comparison to Checkmarx Repository Health is honest. Open Source Select takes the curated-catalog shape; Repository Health takes the scoring-engine shape. Same problem from different angles. Programs running OpenText AppSec consolidate on Open Source Select; programs running Checkmarx One consolidate on Repository Health. Both are valid sourcing-time governance.
What buyers usually underestimate
Related from Merito
Related solutions
Related services
Related products
Frequently Asked Questions
Consultation request
Share your OSS sourcing posture and your catalog-discipline ambitions. A Merito OpenText specialist follows up within one business day.
Sourcing-time
Pre-vetted catalog of OSS components. Programs narrow the dependency surface to libraries they are willing to depend on.
Layered with Core SCA
Open Source Select narrows the front-end; Core SCA evaluates the back-end. Detection without prevention is a triage queue that grows.
Next step
A Merito Open Source Select engagement starts with catalog scoping and catalog-restriction policy. Sourcing-time prevention is an order of magnitude cheaper than detection-time triage.