layout | toc_group | link_title | permalink | redirect_from |
---|---|---|---|---|
docs |
debugging-and-diagnostics |
Inspect Tool |
/reference-manual/native-image/debugging-and-diagnostics/InspectTool/ |
/reference-manual/native-image/inspect/ |
The Native Image Inspect Tool extracts embedded Software Bill of Materials (SBOM) from native executables. The functionality for extracting class-level metadata is no longer supported.
Native Image can embed a SBOM at build time to detect any libraries that may be susceptible to known security vulnerabilities.
Native Image provides the --enable-sbom
option to embed an SBOM into a native executable (only available in Oracle GraalVM).
The Native Image Inspect Tool can extract the compressed SBOM using the --sbom
parameter, as shown in the command:
$JAVA_HOME/bin/native-image-inspect --sbom <path_to_binary>
The Native Image Inspect Tool previously supported listing the classes, fields, and methods included in a native executable or a native shared library.
This functionality is no longer supported for security reasons.
Migrate to using class-level SBOMs instead by passing --enable-sbom=class-level,export
to the native-image
builder, which generates an SBOM containing the same kind of class-level metadata information.