Ce contenu n'est pas disponible dans la langue sélectionnée.

Chapter 4. Configuring IntelliJ to use Dependency Analytics


You can gain access to Red Hat’s Trusted Profile Analyzer service by using the Dependency Analytics plugin for Jet Brains' IntelliJ IDEA application. This plugin gives you access to the latest open source vulnerability information, and insights about your application’s dependent packages.

Dependency Analytics supports the following programming languages:

  • Maven
  • Gradle

    • Groovy
    • Kotlin DSL
  • NPM
  • PNPM
  • Yarn

    • Berry
    • Classic
  • Python
  • Go
Note

The Dependency Analytics extension is an online service maintained by Red Hat. Dependency Analytics only accesses your manifest files to analyze your application dependencies before displaying the results.

Prerequisites

  • Install IntelliJ IDEA on your workstation.
  • For Maven projects, analyzing a pom.xml file, you must have the mvn binary in your system’s PATH environment.
  • For Node projects, analyzing a package.json file, you must have the npm binary in your system’s PATH environment.
  • For Go projects, analyzing a go.mod file, you must have the go binary in your system’s PATH environment.
  • For Python projects, analyzing a requirements.txt file, you must have the python3/pip3 or python/pip binaries in your system’s PATH environment.

Procedure

  1. Open the IntelliJ application.
  2. From the file menu, click Settings , and click Plugins.
  3. Search the Marketplace for Red Hat Dependency Analytics.
  4. Click the INSTALL button to install the plugin.
  5. To start scanning your application for security vulnerabilities, and view the vulnerability report, you can do one of the following:

    • Open a manifest file, hover over a dependency marked by the inline Component Analysis, indicated by the wavy-red line under a dependency, and click Detailed Vulnerability Report.
    • Right click the manifest file in the Project window, and click Dependency Analytics Report.
  6. If you want to exclude specific packages for analysis, you can use the exhortignore as a comment tag for your specific programming language.

    • For Maven, update the pom.xml file:

      ...
      <dependency> <!--exhortignore-->
        <groupId>...</groupId>
        <artifactId>...</artifactId>
        <version>...</version>
      </dependency>
      ...
      Copy to Clipboard Toggle word wrap
    • For Go, update the go.mod file:

      module github.com/trustify-da/SaaSi/deployer
      
      go 1.19
      
      require (
              github.com/davecgh/go-spew v1.1.1 // indirect exhortignore
              github.com/emicklei/go-restful/v3 v3.9.0 // indirect
              github.com/go-logr/logr v1.2.3 // indirect //exhortignore
      
      )
      ...
      Copy to Clipboard Toggle word wrap
    • For Python, update the requirements.txt file:

      ...
      click==8.0.4 #exhortignore
      ...
      Copy to Clipboard Toggle word wrap
    • For Gradle, update the build.gradle file:

      plugins {
      id 'java'
      }
      
      group = 'groupName'
      version = 'version'
      
      repositories {
          mavenCentral()
      }
      
      dependencies {
          implementation "groupId:artifactId:version" // exhortignore
      }
      test {
          useJUnitPlatform()
      }
      Copy to Clipboard Toggle word wrap
Retour au début
Red Hat logoGithubredditYoutubeTwitter

Apprendre

Essayez, achetez et vendez

Communautés

À propos de la documentation Red Hat

Nous aidons les utilisateurs de Red Hat à innover et à atteindre leurs objectifs grâce à nos produits et services avec un contenu auquel ils peuvent faire confiance. Découvrez nos récentes mises à jour.

Rendre l’open source plus inclusif

Red Hat s'engage à remplacer le langage problématique dans notre code, notre documentation et nos propriétés Web. Pour plus de détails, consultez le Blog Red Hat.

À propos de Red Hat

Nous proposons des solutions renforcées qui facilitent le travail des entreprises sur plusieurs plates-formes et environnements, du centre de données central à la périphérie du réseau.

Theme

© 2026 Red Hat