Introducing Codacy's Dependency Explorer

In this article:
Subscribe to our blog:

Managing dependencies across many repositories can feel like navigating a maze. With many libraries, versions, and licensing conflicts, it's easy to lose track of what's used where. 

We're excited to introduce the Dependency Explorer. This new feature gives your organization full visibility into its dependencies to stream their management.

codacy security and risk management dashboard

Dependencies speed up innovation by providing pre-built solutions for common problems. But they also come with challenges. Outdated versions, conflicting licenses, and hidden security vulnerabilities can become significant roadblocks.

codacy dependency checker

What This Feature Offers

The Dependency Explorer, now accessible in the Security and Risk Management Dashboard, has an easy-to-use interface that helps you understand and manage your dependencies:

  • Unified Dependency View: See all dependencies used across your repos. No more piecing together fragmented information—you’ll see everything in one place.

  • Highlighting Problematic Dependencies: Identify risky dependencies. They may be outdated, have known vulnerabilities, or be incompatible with other libraries. Quickly spot and address these to minimize risks.

  • Version Standardization: Highlight cases of using multiple versions of the same dependency. Standardize versions across your organization to improve consistency and reduce maintenance overhead.

  • Findings Associated with Dependencies: ee all findings for each dependency. This lets you trace issues to their root cause. 

  • License Tracking: Review license types. Quickly identify proprietary licenses and take action to prevent unintentional misuse.

How it Works

To get the most out of this new dashboard, activate dependency detection based on your standards and patterns. You can also go one step further, to ensure continuous dependency protection by activating our Proactive Software Composition Analysis (SCA) Scan.

Note: While this feature is only available to Business Tier Organizations, we’re currently working on making it available to Pro Tier Organizations soon!

The Dependency Explorer gives you tools to view, analyze, and standardize your dependencies, putting your team in control.Check it out and let us know what you think. 



RELATED
BLOG POSTS

Codacy Dependency Vulnerability Scanning Now Supports Java
Late last year, we added insecure dependencies detection to Codacy, enabling our users to identify insecure open-source components used within their...
The Risks of Transitive Dependencies in Supply Chain Security
Transitive dependencies are libraries your chosen tools rely on to function—components you didn’t pick but that you still end up needing for your...
Codacy Vulnerability Scanning Now Includes Insecure Dependencies Detection
As recently announced during our latest Product Showcase, our team is invested in developing new and exciting Codacy security features.

Automate code
reviews on your commits and pull request

Group 13