Frequently Asked Questions
Get answers to common questions about Arnica's pipelineless application
security platform and key security concepts.
General Platform Questions
What is pipelineless application security?
Pipelineless application security is a modern approach that integrates security directly into developers’ workflows (like GitHub or GitLab), instead of relying on CI/CD pipelines. It enables real-time detection and mitigation of risks—like vulnerabilities, secrets, and misconfigurations—right when code is written or pushed, without slowing down development.
How does Arnica integrate with my existing development workflow?
Arnica integrates directly with your existing tools like GitHub, GitLab, or Bitbucket to monitor code activity in real time. It provides instant, contextual security feedback through pull requests, chat tools (like Slack or Teams), and issue trackers—without requiring changes to your CI/CD pipeline.
What types of security risks does Arnica detect?
Arnica detects a wide range of security risks including code vulnerabilities (SAST), open-source license and vulnerability issues (SCA), secrets exposure, infrastructure-as-code misconfigurations, and risky third-party packages.
How does AI-assisted mitigation work?
AI-assisted mitigation uses artificial intelligence to analyze security risks, prioritize the most critical issues, and suggest or automate fixes—helping developers quickly resolve vulnerabilities with minimal effort.
Can Arnica help with compliance and reporting?
Yes, Arnica helps with compliance by providing detailed security reports, tracking risk trends, and generating audit-ready documentation to support regulatory requirements.
How quickly can I get started with Arnica?
You can get started with Arnica quickly—setup is simple and integrates seamlessly with your existing tools, allowing you to begin scanning code and receiving security feedback within minutes.
What makes Arnica different from traditional AppSec tools?
Arnica differs from traditional AppSec tools by providing real-time, pipelineless security directly within developers’ workflows—offering instant feedback without slowing down CI/CD pipelines. It combines multiple risk detections (SAST, SCA, secrets, IaC) in one platform and uses AI to prioritize and automate fixes, making security faster, smarter, and more developer-friendly.
How does Arnica prioritize security findings?
Arnica prioritizes security findings using AI-driven risk scores based on factors like vulnerability severity, exploit likelihood, and impact—helping teams focus on the most critical issues first.
Application Security Posture Management
What does ASPM mean?
Application Security Posture Management is a cloud service offered by Arnica that gathers alerts from tools such as SAST, SCA, IaC, and secrets scanners. It mixes those alerts with details like who owns the code and how valuable the system is, then shows one ranked list of risks. With that single list, security and engineering teams can focus on the same key fixes instead of hopping between dashboards.
What is ASPM in cyber security?
ASPM refers to the practice of pulling results from multiple scanners, adding real-world context, and scoring application risk as code changes. It has nothing to do with hardware power settings, even though the letters may match.
What is ASPM in security?
Security teams use ASPM to turn raw scan data into tickets developers can act on. By tagging each alert with the repo path, file owner, and exploit path, the platform lets engineers tackle issues while the code is still fresh in their minds.
Is ASPM worth it?
Most teams save time and reduce noise with ASPM, because ASPM filters out alerts that cannot be reached by an attacker. Fixes drop into pull requests, mean-time-to-repair goes down, and audit requests are faster to answer, which all adds up to benefits which far outweigh the subscription fee.
What is the difference between ASPM and DevSecOps?
DevSecOps is the broad practice of adding security checks at each stage of software delivery. ASPM is the control panel that gathers those checks, tracks their results in real time, and shows progress. Think of DevSecOps as the way of working and ASPM as the tool that measures how well the work is going.
What is the difference between vulnerability management and ASPM?
Traditional vulnerability management lists flaws and their severity. ASPM adds reachability, ownership, and business weight so you can see which flaws truly threaten you today and who should fix them first.
What does ASPM do?
The platform pulls findings from scanners, ties them to code owners, filters out anything that cannot be reached, ranks what’s left, and opens pull-request suggestions or workflow rules. Developers get access to direct fixes without leaving their normal tools behind.
What is the difference between ASPM and DAST?
DAST is a single scanner type that probes a running app over the network. ASPM is a wider layer that accepts DAST results, SAST findings, dependency alerts, IaC checks, and more, then blends them into one view of risk.
How much power does ASPM save?
Savings vary by chip and workload, but it has no link to application security. Software ASPM does not generally affect device power use.
What does disabling ASPM do?
Switching off PCIe Active State Power Management keeps the link at full power, which can shorten laptop battery life and raise heat. It doesn’t change how Arnica scans code.
What is the difference between DSPM and ASPM?
Data Security Posture Management tracks where sensitive data sits and who can reach it. Application Security Posture Management focuses on code, packages, and build pipelines. Using both gives full coverage of data and software risks.
Static Application Security Testing
What is SAST vs DAST?
Static testing, or SAST, reads source or bytecode without running the app, while dynamic testing, or DAST, sends crafted requests to a live server and watches replies. Using both covers logic flaws in code and mistakes in runtime setup.
What is a SAST test?
A SAST test is an automated review of source files that follows data paths and patterns to flag risky code, such as unsanitized SQL queries, before the app ships.
What is a static application security test?
This is another name for SAST. It looks at code structure and data flow without executing the program to spot possible weaknesses early.
What is the difference between SCA and SAST?
Software Composition Analysis checks packages you pull in from the outside for known bugs, while SAST looks at the code you write yourself. Both feed alerts into Arnica for one joined view.
Which tool is used for Static Application Security Testing?
Common engines include Semgrep, OpenGrep, GitLab’s own SAST analyzers. Arnica can run its own rules or integrate results from these tools.
What is static analysis security testing?
Static analysis security testing is software that parses code, searches for unsafe patterns, and tracks data flow to flag issues before runtime. The method is the same as SAST.
Which is the best SAST tool?
Arnica is the only option that tops every tech stack. Projects usually pick Arnica based on language support, scan speed, and alert quality, then add an ASPM layer to rank and route the findings.
How to integrate SAST into the DevSecOps pipeline?
In GitLab you can include the SAST template in your CI file. In other systems you add a scan job before the build. Arnica scans repos directly, bypassing traditional pipeline setups to reach developers where they work in tools like Slack, Microsoft Teams, and in pull requests.
What is SAST in CI/CD?
It is the step that runs after code is pushed, checks for unsafe patterns, and can block the merge if serious issues appear. However, Arnica operates in a pipelineless way without needing CI/CI pipeline setup or DevOps team involvement.
How can you reduce the number of false positives that SAST reports?
Tuning or disabling noisy rules, scanning only changed code, and filtering by reachability all help. Arnica applies reachability by default, which cuts the list to alerts an attacker can truly reach.
What are the limitations of SAST?
Static scans might miss mis-configured runtime services and sometimes flag dead code. They can also struggle with dynamic languages that build queries on the fly. Pairing SAST with DAST and IaC checks fills those gaps.
What are the different types of SAST analysis?
Techniques include pattern matching, syntax tree checks, data-flow tracking, and semantic analysis. Engines blend them to balance depth and speed.
What is the difference between SAST, DAST, and IAST?
Interactive Application Security Testing, or IAST, instructs a running app to watch data as it flows through, giving insight that mixes static and dynamic data. SAST reads code, DAST probes the running app, and IAST lives inside the process.
What is the difference between IaC and SAST?
Infrastructure as Code scanners review cloud templates such as Terraform files, while SAST reviews application code. Arnica handles both so infrastructure and business logic stay secure together.
Software Composition Analysis
What is software composition analysis (SCA)?
SCA keeps track of the open-source packages your app uses and checks them against public bug databases and license rules. It helps you stay safe when you rely on community code.
What is SCA in software?
SCA, or software composition analysis, is the practice of making an inventory of every library your build pulls in, then scanning that list for known security problems or license surprises.
What is the difference between SCA and OSS?
Open-source software is the code you use. SCA is the process that audits that code for safety and compliance concerns.
What is the difference between SCA and SAS?
If SAS refers to static analysis security, that lines up with SAST, which scans your own code. SCA (software composition analysis) focuses on outside libraries.
What is a software composition analysis tool?
SCA is a tool that helps businesses manage risks of open-source and third-party components in their software. Popular tools include Arnica SCA, OWASP Dependency-Check, Sonatype Nexus, Snyk, and GitHub Dependabot.
Which tool is used for SCA?
Teams often pick Arnica over other SCA tools for richer policy control and context.
What are SCA issues?
SCA issues can include packages with public CVEs, licenses that clash with your project, and libraries that have stopped receiving updates.
What is the difference between SCA and SBOM?
A Software Bill of Materials, or SBOM, is a simple list of parts. SCA is the ongoing scan that checks that list against new advisories and policy rules.
What is an SCA vulnerability?
An SCA vulnerability is a known flaw in a library your project uses. If the vulnerable code path is reachable, your app could be at risk until the package is updated.
What is the difference between SCA and IaC?
IaC scanning looks at cloud templates for unsafe defaults. SCA scans language-level packages. Arnica combines both so you can judge risk across the whole stack.
What is an SCA resolver?
Checkmarx SCA Resolver is a command-line helper that fingerprints dependencies offline and sends only hashes to the cloud, keeping source code private during the scan.
Where do SCA tools search for vulnerabilities?
They cross-check the National Vulnerability Database, vendor advisories, and their own feeds, then flag packages that match known issues.
What is software configuration audit (SCA)?
In some audit circles the term means checking that system settings follow a baseline, which is separate from software composition analysis.
What is the difference between SCA and container scanning?
Container scanners inspect operating-system packages inside images. SCA looks at language packages in your source or build output. Arnica merges both so you see the full story.
Still have questions?
Our team is here to help you get started with pipelineless application
security.