ITSS requires (among other things) open-source vulnerability and dependency code scans using one of the CISO-approved scanning tools (see https://pages.github.ibm.com/ciso-psg/main/standards/itss.html).
Is this being done for the Toolbox rpm's (https://www.ibm.com/support/pages/aix-toolbox-open-source-software-overview doesn't say one way or the other)? If so, what scanning tool is being used?
------------------------------
Erich Wolz
------------------------------
#AIXOpenSource