Open-source engine with commercial-grade dataset
The SCANOSS engine is open-source. The OSSKB knowledge base catalogs fingerprints from 100M+ open-source files. Programs get transparency and customer extensibility without sacrificing dataset depth.
SCANOSS • Application security
SCANOSS SCA is open-source-first Software Composition Analysis backed by the OSSKB knowledge base of 100M+ open-source files. Multi-dimensional component identification combines manifest declarations, fingerprint matching, syntax tree parsing, and ML-based similarity scoring to catch declared and undeclared open-source code.
Merito sells SCANOSS SCA and operates the engine deployment, fingerprint calibration, license-policy authoring, and SBOM workflow that turn the open-source platform into a working supply-chain governance program.
What it is
SCANOSS SCA is the open-source-first Software Composition Analysis platform. The engine is open-source and the commercial enterprise editions add support, scale, and governance features. Programs adopting SCANOSS get a transparent and customer-extensible engine without giving up the dataset depth that commercial SCA platforms provide.
Multi-dimensional component identification is the architectural decision that catches what manifest-only scanners miss. Component identification combines four techniques. Manifest declarations cover what package managers explicitly declare. Fingerprint matching against the OSSKB catalogs files against 100M+ open-source files. Syntax tree parsing identifies code patterns even when fingerprint matching alone is inconclusive. ML-based similarity scoring with confidence thresholds flags components that match the OSSKB at a similarity threshold the customer configures.
The OSSKB knowledge base is the practical asset. Fingerprints from more than 100 million open-source files match commercial-grade SCA datasets while remaining open-source. Continuous SBOM generation in SPDX and CycloneDX formats produces audit-ready evidence including the declaration status (declared, undeclared, similarity-matched) of each component.
Programs that adopt SCA without authoring policy generate volume that gets ignored. Merito's standard SCANOSS SCA rollout starts with the dependency baseline against the customer's existing repository inventory, then fingerprint threshold calibration on the customer's tolerance for false positives, then license-policy authoring against the customer's risk tolerance, then SBOM workflow integration into the audit-evidence path.
Ideal use cases
What it is best at
The SCANOSS engine is open-source. The OSSKB knowledge base catalogs fingerprints from 100M+ open-source files. Programs get transparency and customer extensibility without sacrificing dataset depth.
Combines manifest declarations, fingerprint matching, syntax tree parsing, and ML-based similarity scoring. Catches undeclared components that manifest-only scanners miss entirely.
The knowledge base catalogs fingerprints from more than 100 million open-source files. Continuous expansion keeps detection coverage current as new projects appear.
Continuous SBOM generation in SPDX and CycloneDX includes declaration status for each component (declared, undeclared, similarity-matched). Audit-ready evidence beyond what manifest-only SCA produces.
Core capabilities
How SCANOSS SCA finds the open-source code your application uses.
Manifest declarations
Direct and transitive dependencies declared in major package managers (npm, Maven, NuGet, pip, gems, Go modules, Cargo, Composer).
OSSKB fingerprint matching
File-level fingerprint matching against 100M+ open-source files. Catches vendored and copy-pasted code that manifests do not declare.
Syntax tree parsing
Code pattern matching when fingerprints alone are inconclusive. Identifies components through structural similarity.
ML similarity scoring
Confidence-thresholded similarity matching for components that resemble known OSS but do not match exactly.
The dataset that drives finding quality.
100M+ file fingerprints
Catalog of open-source files maintained by SCANOSS. Continuously expanding as new projects appear.
Open-source-first dataset
The OSSKB is part of the open-source ecosystem. Customers gain transparency on the data SCA decisions are made against.
Where SCANOSS SCA findings become enforced policy and audit evidence.
License-compliance policy
Permissive, copyleft, and dual-license categorization with policy enforcement at PR-time and build-gate.
Continuous SBOM generation
SPDX and CycloneDX SBOMs produced continuously as the dependency surface changes. Each component carries declaration status.
Build-gate enforcement
Policy violations gate CI/CD builds. Block-on-introduce policy stops new vulnerabilities while triage works the legacy backlog.
How findings reach developers and the SBOM workflow.
SCM integration
Native PR-time scanning across GitHub, GitLab, Azure DevOps, and Bitbucket.
CI/CD plugin coverage
Build-gate scanning across major CI platforms.
Snippet Detection pairing
Findings flow into the same console as SCANOSS Snippet Detection results for vendored and AI-generated code.
REST API extensibility
Custom integrations into proprietary build systems and audit-evidence reporting.
Where it fits in the stack
Deployment and implementation
Licensing and packaging
SCANOSS Open-Source Edition
Community open-source engine for self-managed deployments. Includes basic fingerprint matching against the OSSKB.
Best for: Pilot programs, OSS-first organizations, or programs with internal capacity to operate open-source AppSec tools.
SCANOSS Commercial Enterprise
Adds support, scale, governance, and managed updates. SaaS and on-prem deployment shapes available.
Best for: Enterprise programs needing predictable SLAs and managed operations.
Merito services
Merito sells licenses and the delivery work around them. Pick the service that matches where you are in the lifecycle.
Engine deployment, fingerprint threshold calibration, license-compliance policy authoring, and SBOM workflow setup.
Explore service02Supply-chain program scoping for SCANOSS adoption alongside Black Duck SCA, Snyk Open Source, and Sonatype Lifecycle.
Explore service03Build-gate SCA in GitHub, GitLab, Azure DevOps, and Bitbucket with package manager wiring.
Explore service04Developer-facing OSS approval workflows and AppSec champion programs.
Explore service05Named engineer, priority SLAs, and release-window coverage for SCANOSS SCA in production.
Explore service06Long-term run support including ongoing fingerprint calibration, license policy maintenance, and SBOM workflow operations.
Explore service07Role-based training for AppSec architects, security engineers, and developers using SCANOSS SCA findings.
Explore serviceSCANOSS SCA licensing
Open-source-first SCA produces signal when fingerprints are calibrated and policies are authored. Buy SCANOSS through Merito and get the deployment, calibration, and SBOM workflow together.
Merito point of view
SCANOSS's open-source engine is the practical differentiator for organizations that value transparency and customer extensibility. The OSSKB knowledge base depth at 100M+ files matches commercial-grade SCA platforms while the engine remains open-source. Programs that adopt SCANOSS for the open-source positioning still need the commercial enterprise edition for production AppSec because predictable SLAs and managed operations matter.
Multi-dimensional component identification is the architecture that catches undeclared components. Programs running manifest-only SCA miss the categories SCANOSS catches because they cannot see vendored code, copy-pasted snippets, or AI-generated open-source. The trade-off is calibration. Fingerprint thresholds must be tuned to the customer's tolerance for false positives.
Continuous SBOM generation including declaration status is the practical compliance asset. Programs responding to executive-order software supply chain expectations or PCI 4.0 software inventory requirements use the SBOM workflow as the audit-evidence path. Manifest-only SCA produces SBOMs that miss the undeclared components SCANOSS catches.
What buyers usually underestimate
Related from Merito
Related solutions
Related services
Related products
Frequently Asked Questions
Consultation request
Share your dependency surface, current SCA tooling, and SBOM workflow needs. A Merito SCANOSS specialist follows up within one business day.
Multi-dimensional identification
Manifest declarations plus fingerprint matching plus syntax parsing plus ML similarity scoring. Catches what manifest-only SCA misses entirely.
OSSKB knowledge base
Dataset depth matches commercial-grade SCA while the engine remains open-source.
Next step
An SCANOSS SCA engagement with Merito starts with the dependency baseline against the customer's repository inventory. Multi-dimensional identification surfaces what manifest-only SCA misses.