Skip to main content

Reachability Analysis with Sonatype CLI

You can configure Sonatype CLI to perform Reachability Analysis, which can detect method signatures in your application code that contain components with potentially exploitable security vulnerabilities. Policy violations occurring due to these vulnerable components are labeled as Reachable and can be viewed on the application report.

By including an additional parameter in the CLI command you can enable the Reachability Analysis feature. The scan process will then analyze all application and dependency Java (or any JVM language) binaries located in the scan target. This allows you to detect reachable vulnerabilities, even in proprietary components within your application.

Permissions Required

Sonatype CLI users should have the Evaluate Applications permissions to scan applications with Reachability Analysis.

Using Java Reachability Analysis

Use the following CLI parameters to enable Java Reachability Analysis:

Parameter

Description

-ra, --reachability

Enable Reachability Analysis in Java or JVM language binaries to determine the method signatures that trigger a security vulnerability.

-rn, --reachability-namespaces

Limit Reachability Analysis to one or more namespaces for faster, more precise results. To specify multiple namespaces, repeat the parameter, e.g., -rn com.package1 -rn org.package2.

Entrypoint Strategy

The entrypoint strategy determines which methods are treated as entry points for your application.

The default entrypoint strategy is CONCRETE, which means every non-abstract, non-synthetic method defined in a non-interface, non-annotation class is considered a potential entry point. Use the --reachability-namespaces parameter (described above) to restrict the method set to specific namespaces and improve the overall results.