Skip to content
OpenText Core SCA (Debricked)

OpenText Core SCA (Debricked)

Category: SCA
License: Freemium
Suphi Cankurt
Suphi Cankurt
+7 Years in AppSec
Updated April 24, 2026
8 min read
Key Takeaways
  • Debricked (now OpenText Core SCA) uses ML-powered vulnerability analysis to identify risks in open-source dependencies across 8+ languages.
  • Native Fortify SSC and Fortify on Demand integration unifies SCA findings alongside SAST results in a single AppSec dashboard.
  • Open Source Select evaluates dependency health scoring before adoption, helping teams choose well-maintained libraries.
  • Free tier available for open-source projects, with automated fix pull requests and SBOM generation in SPDX and CycloneDX formats.

OpenText Core SCA (formerly Debricked) is a developer-friendly SCA platform that uses machine learning to prioritize vulnerabilities and assess dependency health.

Acquired by Micro Focus in 2022 and now part of OpenText, it integrates natively with the Fortify portfolio for unified SAST+SCA management.

Its ML-based approach addresses a real gap: the Sonatype 2026 State of the Software Supply Chain report frames open-source malware as a nation-state-scale threat, and Sonatype has continued to log tens of thousands of malicious packages across public registries year after year — so intelligent prioritization stays essential.

OpenText Core SCA license compliance dashboard showing dependency license analysis

ML models predict exploit likelihood, estimate time-to-fix, and identify patterns beyond what CVSS scores alone provide. A dependency health scoring system flags risky packages even without known vulnerabilities.

What is OpenText Core SCA?

Debricked was founded to make SCA accessible to developers without sacrificing depth. After acquisition, it became OpenText Core SCA while keeping its developer-focused approach.

The Fortify SSC and Fortify on Demand integration means organizations can manage SAST and SCA findings in a single dashboard.

ML-Powered Analysis
Machine learning models predict exploit likelihood, estimate time-to-fix, and identify vulnerability patterns. Prioritizes based on actual risk rather than CVSS scores alone.
Dependency Health
Each dependency gets a health score based on maintenance activity, community size, release frequency, and security track record. Low scores flag risky packages before CVEs exist.
Fortify Integration
Native integration with Fortify SSC and Fortify on Demand. SCA findings appear alongside SAST results with consistent policies across scan types.

Key features

FeatureDetails
ML-powered analysisPredicts exploit likelihood and time-to-fix beyond CVSS
Dependency health scoringMaintenance activity, community size, release frequency assessment
Automated fix PRsVersion updates with breaking change warnings
License complianceHundreds of license types including custom and uncommon
SBOM generationSPDX and CycloneDX formats with transitive dependencies
Ecosystemsnpm, yarn, pnpm, pip, Poetry, Maven, Gradle, Go, Composer, Bundler, NuGet, Cargo
Fortify SSCNative integration for unified SAST+SCA management
PricingFree tier for open-source; Premium and Enterprise plans

ML-powered vulnerability analysis

Machine learning models enrich vulnerability data beyond CVE databases. The system predicts exploit likelihood, estimates time-to-fix, and identifies disclosure patterns to help teams prioritize based on actual risk.

Debricked vulnerability list showing CVE entries with severity scores and dependency details

Dependency health scoring

Each dependency receives a health score based on maintenance activity, community size, release frequency, and security track record. Low scores indicate risky dependencies even without known vulnerabilities.

OpenText Core SCA automation rules for dependency management and vulnerability policies
Proactive Risk Detection
Dependency health scoring flags risky packages before CVEs exist. A library with declining maintenance, few contributors, and sporadic releases gets a low health score regardless of its current vulnerability count.

Automated fix pull requests

The platform creates pull requests with version updates when vulnerabilities are detected. Fix PRs include context about changes and breaking change warnings.

License compliance

Detection covers hundreds of license types including custom and uncommon licenses. Policy rules flag copyleft, commercial restrictions, or specific requirements. Handles multi-license packages and license expressions.

OpenText Core SCA repository license view showing open-source license distribution

SBOM generation

Generates SBOMs in SPDX and CycloneDX formats with transitive dependencies, license information, and vulnerability status.

Malicious package detection and reachability analysis

OpenText Core SCA’s ML-powered analysis is centred on vulnerability prioritization and dependency health scoring — not on behavioural analysis of packages the way Socket or Phylum-era Veracode run it. The product surfaces advisories on typosquats or compromised releases that already exist in public vulnerability feeds (NVD, vendor advisories, proprietary research), but it does not execute or sandbox packages to detect install-time scripts or exfiltration behaviour. For teams whose primary concern is malicious OSS, pair Core SCA with a behavioural tool rather than relying on it alone.

Reachability analysis is similarly scoped. Core SCA does not ship a function-level call-graph reachability layer comparable to Endor Labs or Snyk Open Source on supported languages. Where reachability-adjacent prioritization exists, it is handled through the ML model’s exploit-likelihood and time-to-fix prediction rather than static call-graph tracing. Teams that need explicit code-path reachability typically run a SAST scanner such as Fortify alongside Core SCA and correlate findings inside Fortify SSC.

Integrations

CI/CD & SCM
GitHub Actions GitHub Actions
GitLab CI GitLab CI
Azure DevOps Azure DevOps
Jenkins Jenkins

The CLI hooks into Jenkins, GitHub Actions, GitLab CI, Azure DevOps, Bitbucket Pipelines, and CircleCI — the same six pipelines declared in the page’s frontmatter — so dependency scanning runs on every push or pull request without a dedicated scanner host. IDE plugins for VS Code and IntelliJ let developers inspect findings on a branch before opening a PR.

For unified AppSec management, the Fortify SSC connector forwards Core SCA findings into the same dashboard as Fortify SAST and Fortify on Demand results, so security and engineering leads review one correlated queue rather than two. Dependency update automation is handled through automated fix pull requests — the platform opens PRs with safe version bumps and breaking-change warnings, which teams typically pair with Renovate or Dependabot for the non-security update cadence.

Getting started

1
Install the CLI — Run npm install -g @debricked/cli or brew install debricked/tap/cli on macOS.
2
Authenticate — Run debricked auth login for OAuth, or set DEBRICKED_TOKEN for CI/CD environments.
3
Scan your project — Execute debricked scan . in your project directory. Resolve dependencies first for accurate results.
4
Connect to Fortify — In the Debricked dashboard, add your Fortify SSC connection to see SCA findings alongside SAST results.
Debricked CLI scan output showing vulnerabilities found and dependency health issues

When to use OpenText Core SCA

OpenText Core SCA fits teams wanting developer-friendly SCA with ML-powered prioritization, especially those already using Fortify for SAST.

The ML models and dependency health scoring add intelligence beyond basic CVE matching. The free tier makes it accessible for open-source projects.

The main value of the paid tiers is the Fortify integration and team policy management.

If you do not use Fortify, the ML prioritization and health scoring are still useful, but you lose the unified dashboard advantage.

Best for
Organizations using Fortify for SAST who want to add SCA with unified management. The ML-powered prioritization and dependency health scoring add intelligence beyond basic CVE matching.

How it compares:

vs.Key difference
Snyk Open SourceSnyk has a larger ecosystem and broader language coverage. Debricked has ML-powered prioritization and Fortify integration.
Mend SCAMend has Renovate-powered remediation and merge confidence. Debricked has dependency health scoring and Fortify integration.
DependabotDependabot is free and GitHub-native. Debricked adds ML analysis, health scoring, and Fortify integration.

Further reading: What is SCA? | Open Source License Compliance

OpenText Core SCA pricing

Debricked.com publishes tier pricing publicly — a rarity among enterprise SCA tools. The SCA product ships in three tiers:

  • Free — $0 forever. Includes vulnerability management, licence management, and project health. Capped at 1,000 scans in the first month, then 100 scans per month afterwards.
  • Premium — $25 per contributing developer per month (or $275 billed annually per developer). Adds vulnerability and licence reports, API access with a 5,000-requests-per-hour limit, and chat/email support. Unlimited scans.
  • Enterprise — starts from $30 per contributing developer per month (or $360 billed annually per developer). Adds enterprise support, SBOM export, enterprise SSO, higher computation limits, and unlimited API access.

The Open Source Select product — the dependency-health evaluation layer — is billed separately at $0 for Select Free and $96 per contributing developer per year for Select Enterprise. Neither tier publishes Fortify-bundle pricing; OpenText routes customers who want SCA plus Fortify SAST or Fortify on Demand through standard enterprise sales, where pricing is not published.

For current figures and the latest packaging, confirm directly on debricked.com/pricing — this is one of the few SCA vendors publishing tier numbers openly.

OpenText Core SCA alternatives

The main deciding axis for Core SCA is whether your organization already runs Fortify. Outside of that bundle, a few tools compete directly.

Snyk Open Source

Snyk Open Source is the developer-first default with broader ecosystem coverage and a real free tier. Pick Snyk when fast onboarding and per-developer pricing matter more than Fortify-correlated findings.

Black Duck

Black Duck goes deeper on licence analysis and binary scanning — the right pick for M&A due diligence or legal-heavy license audits. Core SCA is lighter on licence depth but carries tighter integration with Fortify SAST.

Mend SCA

Mend SCA runs a Renovate-style continuous dependency-update loop alongside security fix PRs, which Core SCA does not. Pick Mend when dependency hygiene is a first-class problem.

Dependabot

Dependabot is free and GitHub-native. It covers dependency alerts and update PRs without ML-based prioritization or Fortify integration — the pragmatic pick for GitHub-only teams that do not need an enterprise AppSec dashboard.

For a broader view, see the open-source SCA tools hub and the SCA tools overview.

OpenText Core SCA FAQ

Is this still Debricked?

Yes and no. The product originally launched as Debricked, was acquired by Micro Focus in 2022, and then folded into OpenText when OpenText acquired Micro Focus. It now ships as OpenText Core SCA but the Debricked.com domain, CLI binary, and developer-facing tooling still carry the Debricked name during the transition.

Does OpenText Core SCA require a Fortify licence?

No. Core SCA is a standalone SCA product — you can buy it, scan with it, and receive fix PRs without owning Fortify SAST or Fortify on Demand. The Fortify SSC integration is a bundle benefit for organizations that already run Fortify and want unified SAST+SCA dashboards, not a licensing prerequisite.

What ecosystems does it support?

The CLI resolves dependencies across npm, yarn, pnpm, pip, Poetry, Maven, Gradle, Go modules, Composer, Bundler, NuGet, and Cargo — the ecosystems declared in the key-features table above. Less-common build tools usually still work if you resolve the lockfile before scanning.

How does it relate to OpenText Fortify SCA (the other “SCA”)?

The names collide because OpenText’s portfolio now has two products using “SCA” — Core SCA (this one, formerly Debricked) is the developer-facing dependency scanner, while Fortify Static Code Analyzer (sometimes abbreviated SCA in Fortify docs) is the first-party SAST engine. Fortify SSC correlates findings from both.

Is there a free tier?

Yes. Debricked.com publishes a Free plan at $0 that includes vulnerability management, licence management, and project health, capped at 1,000 scans in the first month and 100 per month thereafter. Premium and Enterprise are paid and require a contributing-developer seat count; see the pricing section above for current shape.

Note: Acquired by Micro Focus in 2022, now part of OpenText. Also known as OpenText Core SCA.

Frequently Asked Questions

What is OpenText Core SCA?
OpenText Core SCA (formerly Debricked) is a developer-friendly SCA platform that uses machine learning to identify vulnerabilities and assess dependency health. It integrates natively with Fortify SSC and Fortify on Demand for unified SAST+SCA management.
Is Debricked free?
Debricked offers a free tier for open-source projects with basic scanning. Paid plans (Premium and Enterprise) add team features, advanced policies, and Fortify integration.
What is dependency health scoring?
Each dependency receives a health score based on maintenance activity, community size, release frequency, and security track record. Low scores flag risky dependencies even without known vulnerabilities, helping teams pick well-maintained alternatives.
How does Fortify integration work?
OpenText Core SCA integrates natively with Fortify Software Security Center and Fortify on Demand. SCA findings appear alongside SAST results in the same dashboard, with consistent policies across both scan types.