{"id":2264,"date":"2020-05-29T09:31:26","date_gmt":"2020-05-29T07:31:26","guid":{"rendered":"https:\/\/geko2.factoryfy.com\/es\/?p=1990"},"modified":"2021-11-07T22:29:25","modified_gmt":"2021-11-07T21:29:25","slug":"dependency-track-analiza-tus-vulnerabilidades-por-el-uso-de-componentes-de-terceros","status":"publish","type":"post","link":"https:\/\/geko.cloud\/es\/dependency-track-analiza-tus-vulnerabilidades-por-el-uso-de-componentes-de-terceros\/","title":{"rendered":"Dependency Track: analiza tus vulnerabilidades por el uso de componentes de terceros"},"content":{"rendered":"<p>En esta publicaci\u00f3n vamos a hablar sobre la herramienta OWASP llamada Dependency-Track. Para empezar, una buena pregunta es&#8230;<\/p>\n<h2><strong>\u00bfQu\u00e9 es el Dependency-Track?<\/strong><\/h2>\n<p>Dependency Track es una herramienta de an\u00e1lisis de vulnerabilidad que audita los componentes o bibliotecas externas que utilizamos para nuestras aplicaciones. Esta herramienta tiene integraciones con diferentes bases de datos de vulnerabilidades como NPM Public Advisories, National Vulnerability Database, Sonartype OSS Index y VulnDB.<br \/>\nDependency Track se encarga de analizar de forma proactiva todas tus aplicaciones para detectar vulnerabilidades en los componentes de c\u00f3digo abierto que pueden poner en riesgo tu aplicaci\u00f3n.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-5392 size-large\" src=\"https:\/\/geko.cloud\/wp-content\/uploads\/2020\/05\/dashboard-dependency-track-1-1024x647.png\" alt=\"dashboard dependency track\" width=\"800\" height=\"505\" srcset=\"https:\/\/geko.cloud\/wp-content\/uploads\/2020\/05\/dashboard-dependency-track-1-1024x647.png 1024w, https:\/\/geko.cloud\/wp-content\/uploads\/2020\/05\/dashboard-dependency-track-1-300x190.png 300w, https:\/\/geko.cloud\/wp-content\/uploads\/2020\/05\/dashboard-dependency-track-1-768x485.png 768w, https:\/\/geko.cloud\/wp-content\/uploads\/2020\/05\/dashboard-dependency-track-1-1536x970.png 1536w, https:\/\/geko.cloud\/wp-content\/uploads\/2020\/05\/dashboard-dependency-track-1-2048x1294.png 2048w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/><\/p>\n<h2><strong>\u00bfC\u00f3mo funciona Dependency-Track?<\/strong><\/h2>\n<div class=\"tlid-input input\">\n<div class=\"source-wrap\">\n<div class=\"input-full-height-wrapper tlid-input-full-height-wrapper\">\n<div class=\"source-input\">\n<div class=\"source-footer-wrap source-or-target-footer\">\n<div class=\"source-footer\">\n<div class=\"src-tts left-positioned ttsbutton jfk-button-flat source-or-target-footer-button jfk-button\" tabindex=\"0\" role=\"button\" aria-label=\"Escuchar\" data-tooltip=\"Escuchar\" aria-pressed=\"false\" data-tooltip-align=\"t,c\" aria-hidden=\"false\" aria-disabled=\"false\">\n<div class=\"jfk-button-img\"><span title=\"\">Dependency-Track aprovecha al m\u00e1ximo el Software Bill-of-Materials (SBOM).<\/span> <span class=\"\" title=\"\">Gracias a esto, podemos obtener informaci\u00f3n m\u00e1s completa y sofisticada que con el an\u00e1lisis de componentes tradicional.<\/span><\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<div class=\"tlid-results-container results-container\">\n<div class=\"tlid-result result-dict-wrapper\">\n<div class=\"result tlid-copy-target\">\n<div class=\"text-wrap tlid-copy-target\">\n<div class=\"result-shield-container tlid-copy-target\" tabindex=\"0\"><span class=\"tlid-translation translation\" lang=\"es\"><span class=\"tlid-translation translation\" lang=\"es\"><br \/>\n<span title=\"\">Estos archivos BoM (Bill-of-Materials) definen y describen el contenido que se utiliza en la fabricaci\u00f3n de los entregables.<\/span> <span title=\"\">Este contenido incluye los datos del autor, editores, licencias, versiones y derechos de autor.<\/span><\/span><\/span><span class=\"\" title=\"\">Para generar el archivo BoM tenemos varias herramientas, pero una de las m\u00e1s conocidas es CycloneDX.<\/span> <span class=\"\" title=\"\">Una vez que tenemos nuestro archivo BoM, podemos subirlo a Dependency-Track manualmente o integrando la carga en nuestro CICD.<\/span><\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-2006\" src=\"https:\/\/geko2.factoryfy.com\/wp-content\/uploads\/bom-component.png\" alt=\"\" width=\"865\" height=\"324\" \/><\/p>\n<p>CycloneDX admite y\u00a0 se integra a trav\u00e9s de sus complementos con varios idiomas<\/p>\n<ul>\n<li><a href=\"https:\/\/github.com\/CycloneDX\/cyclonedx-dotnet\">CycloneDX .NET Core<\/a><\/li>\n<li><a href=\"https:\/\/github.com\/CycloneDX\/cyclonedx-node-module\">CycloneDX Node.js Module<\/a><\/li>\n<li><a href=\"https:\/\/github.com\/CycloneDX\/cyclonedx-maven-plugin\">CycloneDX Java (Maven) Plugin<\/a><\/li>\n<li><a href=\"https:\/\/github.com\/CycloneDX\/cyclonedx-gradle-plugin\">CycloneDX Java (Gradle) Plugin<\/a><\/li>\n<li><a href=\"https:\/\/github.com\/CycloneDX\/cyclonedx-core-java\">CycloneDX Java API<\/a><\/li>\n<li><a href=\"https:\/\/github.com\/CycloneDX\/cyclonedx-php-composer\">CycloneDX PHP Composer<\/a><\/li>\n<li><a href=\"https:\/\/github.com\/CycloneDX\/cyclonedx-python\">CycloneDX Python Module<\/a><\/li>\n<li><a href=\"https:\/\/github.com\/CycloneDX\/cyclonedx-ruby-gem\">CycloneDX Ruby Gem<\/a><\/li>\n<li><a href=\"https:\/\/github.com\/CycloneDX\/cyclonedx-rust-cargo\">CycloneDX Rust Cargo<\/a><\/li>\n<\/ul>\n<h2><strong>Integrationes con\u00a0<\/strong><strong>Dependency-Track\u00a0<\/strong><\/h2>\n<div class=\"tlid-input input\">\n<div class=\"source-wrap\">\n<div class=\"input-full-height-wrapper tlid-input-full-height-wrapper\">\n<div class=\"source-input\">\n<div class=\"source-footer-wrap source-or-target-footer\">\n<div class=\"character-count tlid-character-count\"><\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<div class=\"tlid-results-container results-container\">\n<div class=\"tlid-result result-dict-wrapper\">\n<div class=\"result tlid-copy-target\">\n<div class=\"result-header\">\n<div class=\"starbutton jfk-button-flat jfk-button unstarred\" tabindex=\"0\" role=\"button\" aria-label=\"Destacar traducci\u00f3n\" data-tooltip=\"Destacar traducci\u00f3n\" data-tooltip-align=\"t,c\">\n<div class=\"jfk-button-img\"><span class=\"\" title=\"\">Dependency Track est\u00e1 dise\u00f1ado para integrarse f\u00e1cilmente en nuestros procesos de Integraci\u00f3n continua e Implementaci\u00f3n continua.<\/span> <span class=\"\" title=\"\">Para hacer todo esto, tiene una potente API y un complemento para Jenkins que nos permite integrar este proceso en nuestras pipelines.<\/span><\/div>\n<\/div>\n<\/div>\n<div class=\"text-wrap tlid-copy-target\">\n<div class=\"result-shield-container tlid-copy-target\" tabindex=\"0\"><span class=\"tlid-translation translation\" lang=\"es\"><span class=\"tlid-translation translation\" lang=\"es\"><br \/>\n<span class=\"\" title=\"\">Dependency-Track permite a los equipos <a href=\"https:\/\/geko.cloud\/es\/devops\/\">DevOps<\/a> acelerar los procesos y el desarrollo y a su vez controla el uso de componentes externos y los riesgos que pueden causar.<\/span><\/span><\/span><span class=\"\" title=\"\">Esta herramienta tambi\u00e9n tiene un sistema de alerta integrado por correo electr\u00f3nico o con integraciones con varios servicios de mensajer\u00eda como Slack o Microsoft Teams.<\/span> <span class=\"\" title=\"\">Todos ellos personalizables a trav\u00e9s de plantillas.<\/span><\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-5386 size-large\" src=\"https:\/\/geko.cloud\/wp-content\/uploads\/2020\/05\/integrations-dependency-track-1024x781.png\" alt=\"integrations dependency track\" width=\"800\" height=\"610\" srcset=\"https:\/\/geko.cloud\/wp-content\/uploads\/2020\/05\/integrations-dependency-track-1024x781.png 1024w, https:\/\/geko.cloud\/wp-content\/uploads\/2020\/05\/integrations-dependency-track-300x229.png 300w, https:\/\/geko.cloud\/wp-content\/uploads\/2020\/05\/integrations-dependency-track-768x586.png 768w, https:\/\/geko.cloud\/wp-content\/uploads\/2020\/05\/integrations-dependency-track-1536x1171.png 1536w, https:\/\/geko.cloud\/wp-content\/uploads\/2020\/05\/integrations-dependency-track.png 1818w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/><\/p>\n<h2><strong>\u00bfC\u00f3mo puedo implementarlo?<\/strong><\/h2>\n<p>Para crear tu propio servicio Dependency-Track tienes varias opciones:<\/p>\n<ul>\n<li><strong>Usando War<\/strong> -&gt; Esta es la opci\u00f3n m\u00e1s dif\u00edcil de implementar, ya que requiere un contenedor de Servlet ya instalado y configurado como Apache Tomcat 8.5 o superior, sin embargo, ofrece las opciones de implementaci\u00f3n m\u00e1s flexibles<\/li>\n<li><strong>Ejecutable War<\/strong> -&gt; El WAR ejecutable Dependency-Track se entrega listo para ejecutarse. Un WAR ejecutable es un Java Web Archive (WAR) tradicional que se empaqueta de forma que se puede ejecutar desde la l\u00ednea de comandos.<\/li>\n<li><strong>Docker Container<\/strong> -&gt; Implementarlo con Docker es el m\u00e9todo m\u00e1s f\u00e1cil y r\u00e1pido para comenzar. No se requieren requisitos previos m\u00e1s all\u00e1 de disponer de una versi\u00f3n moderna de Docker.<\/li>\n<\/ul>\n<div class=\"tlid-input input\">\n<div class=\"source-wrap\">\n<div class=\"input-full-height-wrapper tlid-input-full-height-wrapper\">\n<div class=\"source-input\">\n<div class=\"source-footer-wrap source-or-target-footer\">\n<div class=\"character-count tlid-character-count\"><\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<div class=\"tlid-results-container results-container\">\n<div class=\"tlid-result result-dict-wrapper\">\n<div class=\"result tlid-copy-target\">\n<div class=\"result-header\">\n<div class=\"starbutton jfk-button-flat jfk-button unstarred\" tabindex=\"0\" role=\"button\" aria-label=\"Destacar traducci\u00f3n\" data-tooltip=\"Destacar traducci\u00f3n\" data-tooltip-align=\"t,c\">\n<div class=\"jfk-button-img\">Lee m\u00e1s sobre Dependency-Track aqu\u00ed:<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<ul>\n<li><a href=\"https:\/\/dependencytrack.org\/\">Official Website<\/a><\/li>\n<li><a href=\"https:\/\/docs.dependencytrack.org\/\">Official Documentation<\/a><\/li>\n<li><a href=\"https:\/\/github.com\/DependencyTrack\/dependency-track\">Official Repository<\/a><\/li>\n<li><a href=\"https:\/\/wiki.jenkins.io\/display\/JENKINS\/OWASP+Dependency-Track+Plugin\">Dependency-Track plugin for Jenkins<\/a><\/li>\n<\/ul>\n<hr \/>\n<p>Espero que hayas disfrutado de este post y te animo a que <a href=\"https:\/\/geko.cloud\/es\/blog\/\">revises nuestro blog para leer otros posts<\/a> que puedan ser de tu inter\u00e9s. <a href=\"https:\/\/geko.cloud\/es\/contacto\/\">No dudes en contactarnos<\/a> si deseas que te ayudemos en tus proyectos.<\/p>\n<p>\u00a1Nos vemos en la pr\u00f3xima entrada!<\/p>\n","protected":false},"excerpt":{"rendered":"<p>En esta publicaci\u00f3n vamos a hablar sobre la herramienta OWASP llamada Dependency-Track. Para empezar, una buena pregunta es&#8230; \u00bfQu\u00e9 es el Dependency-Track? Dependency Track es una herramienta de an\u00e1lisis de vulnerabilidad que audita los componentes o bibliotecas externas que utilizamos para nuestras aplicaciones. Esta herramienta tiene integraciones con diferentes bases de datos de vulnerabilidades como [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":2265,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"inline_featured_image":false,"footnotes":""},"categories":[18],"tags":[58],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v22.5 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Dependency Track: analiza tus vulnerabilidades por el uso de componentes de terceros - Geko Cloud<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/geko.cloud\/es\/dependency-track-analiza-tus-vulnerabilidades-por-el-uso-de-componentes-de-terceros\/\" \/>\n<meta property=\"og:locale\" content=\"es_ES\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Dependency Track: analiza tus vulnerabilidades por el uso de componentes de terceros - Geko Cloud\" \/>\n<meta property=\"og:description\" content=\"En esta publicaci\u00f3n vamos a hablar sobre la herramienta OWASP llamada Dependency-Track. Para empezar, una buena pregunta es&#8230; \u00bfQu\u00e9 es el Dependency-Track? Dependency Track es una herramienta de an\u00e1lisis de vulnerabilidad que audita los componentes o bibliotecas externas que utilizamos para nuestras aplicaciones. Esta herramienta tiene integraciones con diferentes bases de datos de vulnerabilidades como [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/geko.cloud\/es\/dependency-track-analiza-tus-vulnerabilidades-por-el-uso-de-componentes-de-terceros\/\" \/>\n<meta property=\"og:site_name\" content=\"Geko Cloud\" \/>\n<meta property=\"article:published_time\" content=\"2020-05-29T07:31:26+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-11-07T21:29:25+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/geko.cloud\/wp-content\/uploads\/dtrack-logo.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1400\" \/>\n\t<meta property=\"og:image:height\" content=\"443\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Jose Luis S\u00e1nchez\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@geko_cloud\" \/>\n<meta name=\"twitter:site\" content=\"@geko_cloud\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/geko.cloud\/es\/dependency-track-analiza-tus-vulnerabilidades-por-el-uso-de-componentes-de-terceros\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/geko.cloud\/es\/dependency-track-analiza-tus-vulnerabilidades-por-el-uso-de-componentes-de-terceros\/\"},\"author\":{\"name\":\"Jose Luis S\u00e1nchez\",\"@id\":\"https:\/\/geko.cloud\/es\/#\/schema\/person\/d06aff498ebfbc75b5010ebe92af41ed\"},\"headline\":\"Dependency Track: analiza tus vulnerabilidades por el uso de componentes de terceros\",\"datePublished\":\"2020-05-29T07:31:26+00:00\",\"dateModified\":\"2021-11-07T21:29:25+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/geko.cloud\/es\/dependency-track-analiza-tus-vulnerabilidades-por-el-uso-de-componentes-de-terceros\/\"},\"wordCount\":556,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/geko.cloud\/es\/#organization\"},\"image\":{\"@id\":\"https:\/\/geko.cloud\/es\/dependency-track-analiza-tus-vulnerabilidades-por-el-uso-de-componentes-de-terceros\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/geko.cloud\/wp-content\/uploads\/dtrack-logo.png\",\"keywords\":[\"cicd\"],\"articleSection\":[\"Labs\"],\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/geko.cloud\/es\/dependency-track-analiza-tus-vulnerabilidades-por-el-uso-de-componentes-de-terceros\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/geko.cloud\/es\/dependency-track-analiza-tus-vulnerabilidades-por-el-uso-de-componentes-de-terceros\/\",\"url\":\"https:\/\/geko.cloud\/es\/dependency-track-analiza-tus-vulnerabilidades-por-el-uso-de-componentes-de-terceros\/\",\"name\":\"Dependency Track: analiza tus vulnerabilidades por el uso de componentes de terceros - Geko Cloud\",\"isPartOf\":{\"@id\":\"https:\/\/geko.cloud\/es\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/geko.cloud\/es\/dependency-track-analiza-tus-vulnerabilidades-por-el-uso-de-componentes-de-terceros\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/geko.cloud\/es\/dependency-track-analiza-tus-vulnerabilidades-por-el-uso-de-componentes-de-terceros\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/geko.cloud\/wp-content\/uploads\/dtrack-logo.png\",\"datePublished\":\"2020-05-29T07:31:26+00:00\",\"dateModified\":\"2021-11-07T21:29:25+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/geko.cloud\/es\/dependency-track-analiza-tus-vulnerabilidades-por-el-uso-de-componentes-de-terceros\/#breadcrumb\"},\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/geko.cloud\/es\/dependency-track-analiza-tus-vulnerabilidades-por-el-uso-de-componentes-de-terceros\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/geko.cloud\/es\/dependency-track-analiza-tus-vulnerabilidades-por-el-uso-de-componentes-de-terceros\/#primaryimage\",\"url\":\"https:\/\/geko.cloud\/wp-content\/uploads\/dtrack-logo.png\",\"contentUrl\":\"https:\/\/geko.cloud\/wp-content\/uploads\/dtrack-logo.png\",\"width\":1400,\"height\":443,\"caption\":\"dependency track logo\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/geko.cloud\/es\/dependency-track-analiza-tus-vulnerabilidades-por-el-uso-de-componentes-de-terceros\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Portada\",\"item\":\"https:\/\/geko.cloud\/es\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Dependency Track: analiza tus vulnerabilidades por el uso de componentes de terceros\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/geko.cloud\/es\/#website\",\"url\":\"https:\/\/geko.cloud\/es\/\",\"name\":\"Geko Cloud\",\"description\":\"Servicios de consultor\u00eda cloud y devops\",\"publisher\":{\"@id\":\"https:\/\/geko.cloud\/es\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/geko.cloud\/es\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"es\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/geko.cloud\/es\/#organization\",\"name\":\"Geko Cloud\",\"url\":\"https:\/\/geko.cloud\/es\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/geko.cloud\/es\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/geko.cloud\/wp-content\/uploads\/2021\/10\/geko_logo-positivo.png\",\"contentUrl\":\"https:\/\/geko.cloud\/wp-content\/uploads\/2021\/10\/geko_logo-positivo.png\",\"width\":1650,\"height\":809,\"caption\":\"Geko Cloud\"},\"image\":{\"@id\":\"https:\/\/geko.cloud\/es\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/geko_cloud\",\"https:\/\/www.instagram.com\/gekocloud\/\",\"https:\/\/www.linkedin.com\/company\/gekocloud\",\"https:\/\/www.youtube.com\/channel\/UC5EFLCqUM7fEaXSa_0nWowQ\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/geko.cloud\/es\/#\/schema\/person\/d06aff498ebfbc75b5010ebe92af41ed\",\"name\":\"Jose Luis S\u00e1nchez\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/geko.cloud\/es\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/ebfd055d4dba456220c682523fcc237c?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/ebfd055d4dba456220c682523fcc237c?s=96&d=mm&r=g\",\"caption\":\"Jose Luis S\u00e1nchez\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Dependency Track: analiza tus vulnerabilidades por el uso de componentes de terceros - Geko Cloud","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/geko.cloud\/es\/dependency-track-analiza-tus-vulnerabilidades-por-el-uso-de-componentes-de-terceros\/","og_locale":"es_ES","og_type":"article","og_title":"Dependency Track: analiza tus vulnerabilidades por el uso de componentes de terceros - Geko Cloud","og_description":"En esta publicaci\u00f3n vamos a hablar sobre la herramienta OWASP llamada Dependency-Track. Para empezar, una buena pregunta es&#8230; \u00bfQu\u00e9 es el Dependency-Track? Dependency Track es una herramienta de an\u00e1lisis de vulnerabilidad que audita los componentes o bibliotecas externas que utilizamos para nuestras aplicaciones. Esta herramienta tiene integraciones con diferentes bases de datos de vulnerabilidades como [&hellip;]","og_url":"https:\/\/geko.cloud\/es\/dependency-track-analiza-tus-vulnerabilidades-por-el-uso-de-componentes-de-terceros\/","og_site_name":"Geko Cloud","article_published_time":"2020-05-29T07:31:26+00:00","article_modified_time":"2021-11-07T21:29:25+00:00","og_image":[{"width":1400,"height":443,"url":"https:\/\/geko.cloud\/wp-content\/uploads\/dtrack-logo.png","type":"image\/png"}],"author":"Jose Luis S\u00e1nchez","twitter_card":"summary_large_image","twitter_creator":"@geko_cloud","twitter_site":"@geko_cloud","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/geko.cloud\/es\/dependency-track-analiza-tus-vulnerabilidades-por-el-uso-de-componentes-de-terceros\/#article","isPartOf":{"@id":"https:\/\/geko.cloud\/es\/dependency-track-analiza-tus-vulnerabilidades-por-el-uso-de-componentes-de-terceros\/"},"author":{"name":"Jose Luis S\u00e1nchez","@id":"https:\/\/geko.cloud\/es\/#\/schema\/person\/d06aff498ebfbc75b5010ebe92af41ed"},"headline":"Dependency Track: analiza tus vulnerabilidades por el uso de componentes de terceros","datePublished":"2020-05-29T07:31:26+00:00","dateModified":"2021-11-07T21:29:25+00:00","mainEntityOfPage":{"@id":"https:\/\/geko.cloud\/es\/dependency-track-analiza-tus-vulnerabilidades-por-el-uso-de-componentes-de-terceros\/"},"wordCount":556,"commentCount":0,"publisher":{"@id":"https:\/\/geko.cloud\/es\/#organization"},"image":{"@id":"https:\/\/geko.cloud\/es\/dependency-track-analiza-tus-vulnerabilidades-por-el-uso-de-componentes-de-terceros\/#primaryimage"},"thumbnailUrl":"https:\/\/geko.cloud\/wp-content\/uploads\/dtrack-logo.png","keywords":["cicd"],"articleSection":["Labs"],"inLanguage":"es","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/geko.cloud\/es\/dependency-track-analiza-tus-vulnerabilidades-por-el-uso-de-componentes-de-terceros\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/geko.cloud\/es\/dependency-track-analiza-tus-vulnerabilidades-por-el-uso-de-componentes-de-terceros\/","url":"https:\/\/geko.cloud\/es\/dependency-track-analiza-tus-vulnerabilidades-por-el-uso-de-componentes-de-terceros\/","name":"Dependency Track: analiza tus vulnerabilidades por el uso de componentes de terceros - Geko Cloud","isPartOf":{"@id":"https:\/\/geko.cloud\/es\/#website"},"primaryImageOfPage":{"@id":"https:\/\/geko.cloud\/es\/dependency-track-analiza-tus-vulnerabilidades-por-el-uso-de-componentes-de-terceros\/#primaryimage"},"image":{"@id":"https:\/\/geko.cloud\/es\/dependency-track-analiza-tus-vulnerabilidades-por-el-uso-de-componentes-de-terceros\/#primaryimage"},"thumbnailUrl":"https:\/\/geko.cloud\/wp-content\/uploads\/dtrack-logo.png","datePublished":"2020-05-29T07:31:26+00:00","dateModified":"2021-11-07T21:29:25+00:00","breadcrumb":{"@id":"https:\/\/geko.cloud\/es\/dependency-track-analiza-tus-vulnerabilidades-por-el-uso-de-componentes-de-terceros\/#breadcrumb"},"inLanguage":"es","potentialAction":[{"@type":"ReadAction","target":["https:\/\/geko.cloud\/es\/dependency-track-analiza-tus-vulnerabilidades-por-el-uso-de-componentes-de-terceros\/"]}]},{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/geko.cloud\/es\/dependency-track-analiza-tus-vulnerabilidades-por-el-uso-de-componentes-de-terceros\/#primaryimage","url":"https:\/\/geko.cloud\/wp-content\/uploads\/dtrack-logo.png","contentUrl":"https:\/\/geko.cloud\/wp-content\/uploads\/dtrack-logo.png","width":1400,"height":443,"caption":"dependency track logo"},{"@type":"BreadcrumbList","@id":"https:\/\/geko.cloud\/es\/dependency-track-analiza-tus-vulnerabilidades-por-el-uso-de-componentes-de-terceros\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Portada","item":"https:\/\/geko.cloud\/es\/"},{"@type":"ListItem","position":2,"name":"Dependency Track: analiza tus vulnerabilidades por el uso de componentes de terceros"}]},{"@type":"WebSite","@id":"https:\/\/geko.cloud\/es\/#website","url":"https:\/\/geko.cloud\/es\/","name":"Geko Cloud","description":"Servicios de consultor\u00eda cloud y devops","publisher":{"@id":"https:\/\/geko.cloud\/es\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/geko.cloud\/es\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"es"},{"@type":"Organization","@id":"https:\/\/geko.cloud\/es\/#organization","name":"Geko Cloud","url":"https:\/\/geko.cloud\/es\/","logo":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/geko.cloud\/es\/#\/schema\/logo\/image\/","url":"https:\/\/geko.cloud\/wp-content\/uploads\/2021\/10\/geko_logo-positivo.png","contentUrl":"https:\/\/geko.cloud\/wp-content\/uploads\/2021\/10\/geko_logo-positivo.png","width":1650,"height":809,"caption":"Geko Cloud"},"image":{"@id":"https:\/\/geko.cloud\/es\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/geko_cloud","https:\/\/www.instagram.com\/gekocloud\/","https:\/\/www.linkedin.com\/company\/gekocloud","https:\/\/www.youtube.com\/channel\/UC5EFLCqUM7fEaXSa_0nWowQ"]},{"@type":"Person","@id":"https:\/\/geko.cloud\/es\/#\/schema\/person\/d06aff498ebfbc75b5010ebe92af41ed","name":"Jose Luis S\u00e1nchez","image":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/geko.cloud\/es\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/ebfd055d4dba456220c682523fcc237c?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/ebfd055d4dba456220c682523fcc237c?s=96&d=mm&r=g","caption":"Jose Luis S\u00e1nchez"}}]}},"_links":{"self":[{"href":"https:\/\/geko.cloud\/es\/wp-json\/wp\/v2\/posts\/2264"}],"collection":[{"href":"https:\/\/geko.cloud\/es\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/geko.cloud\/es\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/geko.cloud\/es\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/geko.cloud\/es\/wp-json\/wp\/v2\/comments?post=2264"}],"version-history":[{"count":6,"href":"https:\/\/geko.cloud\/es\/wp-json\/wp\/v2\/posts\/2264\/revisions"}],"predecessor-version":[{"id":5394,"href":"https:\/\/geko.cloud\/es\/wp-json\/wp\/v2\/posts\/2264\/revisions\/5394"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/geko.cloud\/es\/wp-json\/wp\/v2\/media\/2265"}],"wp:attachment":[{"href":"https:\/\/geko.cloud\/es\/wp-json\/wp\/v2\/media?parent=2264"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/geko.cloud\/es\/wp-json\/wp\/v2\/categories?post=2264"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/geko.cloud\/es\/wp-json\/wp\/v2\/tags?post=2264"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}