Skip to main content

Black Duck OpsSight

Automatic Open Source Vulnerability Detection for Containers

Download the Data Sheet

Black Duck OpsSight helps you prevent known open source vulnerabilities from being deployed into production environments. With OpsSight, you can:

  • Automatically scan and inventory all open source in container images as they are utilized
  • Identify and highlight any images that contain disclosed open source vulnerabilities
  • Flag container images that violate open source security policies 
  • Receive automated alerts when any newly discovered vulnerabilities may affect container images in use within your cluster

Truly Understand What’s Inside Your Containers

With OpsSight you have unprecedented visibility into the open source components and any associated security vulnerabilities that exist in the container images you create and those that are running in production. Black Duck OpsSight integrates directly into your container orchestration platforms, ensuring that you have the visibility and control you need to minimize risk to your applications.

Supported Platforms


Black Duck OpenShift

OpenShift Container Platform

Learn More

Black Duck Kubernetes Integration


Learn More

What You Get with OpsSight


Automatically Scan New Images

OpsSight works with your container orchestration platform to scan any container image as it is utilized within the cluster and report on any known vulnerabilities by checking against our comprehensive KnowledgeBase.



Listen for Any Changes

OpsSight listens for any changes within your orchestration platform’s event streams. If any container images are altered, OpsSight automatically scans the image and will reassess the open source risk in the code.



Monitor Continuously

OpsSight continuously monitors for new open source security disclosures and component changes for the open source found in your container images. It alerts you to any changes in risk since the container image was last updated.



Annotate Risk Information

Scan results are placed as metadata on the container image so you can display vulnerability risk and enforce policies directly from the console of your container orchestration platform.