back to home

oss-review-toolkit / ort

A suite of tools to automate software compliance checks.

1,967 stars
376 forks
326 issues
KotlinJavaScriptShell

AI Architecture Analysis

This repository is indexed by RepoMind. By analyzing oss-review-toolkit/ort in our AI interface, you can instantly generate complete architecture diagrams, visualize control flows, and perform automated security audits across the entire codebase.

Our Agentic Context Augmented Generation (Agentic CAG) engine loads full source files into context on-demand, avoiding the fragmentation of traditional RAG systems. Ask questions about the architecture, dependencies, or specific features to see it in action.

Source files are only loaded when you start an analysis to optimize performance.

Embed this Badge

Showcase RepoMind's analysis directly in your repository's README.

[![Analyzed by RepoMind](https://img.shields.io/badge/Analyzed%20by-RepoMind-4F46E5?style=for-the-badge)](https://repomind.in/repo/oss-review-toolkit/ort)
Preview:Analyzed by RepoMind

Repository Overview (README excerpt)

Crawler view

  [![Slack][1]][2] [![Static Analysis][3]][4] [![Build and Test][5]][6] [![Code coverage][7]][8] [![REUSE status][9]][10] [![OpenSSF Best Practices][11]][12] [![OpenSSF Scorecard][13]][14] [1]: https://img.shields.io/badge/Join_us_on_Slack!-ort--talk-blue.svg?longCache=true&logo=slack [2]: http://slack.oss-review-toolkit.org [3]: https://github.com/oss-review-toolkit/ort/actions/workflows/static-analysis.yml/badge.svg [4]: https://github.com/oss-review-toolkit/ort/actions/workflows/static-analysis.yml [5]: https://github.com/oss-review-toolkit/ort/actions/workflows/build-and-test.yml/badge.svg [6]: https://github.com/oss-review-toolkit/ort/actions/workflows/build-and-test.yml [7]: https://codecov.io/gh/oss-review-toolkit/ort/branch/main/graph/badge.svg?token=QD2tCSUTVN [8]: https://app.codecov.io/gh/oss-review-toolkit/ort [9]: https://api.reuse.software/badge/github.com/oss-review-toolkit/ort [10]: https://api.reuse.software/info/github.com/oss-review-toolkit/ort [11]: https://www.bestpractices.dev/projects/4618/badge [12]: https://www.bestpractices.dev/projects/4618 [13]: https://api.scorecard.dev/projects/github.com/oss-review-toolkit/ort/badge [14]: https://scorecard.dev/viewer/?uri=github.com/oss-review-toolkit/ort Introduction The OSS Review Toolkit (ORT) is a FOSS policy automation and orchestration toolkit that you can use to manage your (open source) software dependencies in a strategic, safe and efficient manner. You can use it to: • Generate CycloneDX, SPDX SBOMs, or custom FOSS attribution documentation for your software project • Automate your FOSS policy using risk-based Policy as Code to do licensing, security vulnerability, InnerSource and engineering standards checks for your software project and its dependencies • Create a source code archive for your software project and its dependencies to comply with certain licenses or have your own copy as nothing on the internet is forever • Correct package metadata or licensing findings yourself, using InnerSource or with the help of the FOSS community ORT can be used as a library (for programmatic use), via a command line interface (for scripted use), or via its CI integrations. It consists of the following tools which can be combined into a *highly customizable* pipeline: • *Analyzer*: Determines the dependencies of projects and their metadata, abstracting which package managers or build systems are actually being used. • *Downloader*: Fetches all source code of the projects and their dependencies, abstracting which Version Control System (VCS) or other means are used to retrieve the source code. • *Scanner*: Uses configured source code scanners to detect license / copyright findings, abstracting the type of scanner. • *Advisor*: Retrieves security advisories for used dependencies from configured vulnerability data services. • *Evaluator*: Evaluates custom policy rules along with custom license classifications against the data gathered in preceding stages and returns a list of policy violations, e.g. to flag license findings. • *Reporter*: Presents results in various formats such as visual reports, Open Source notices or Bill-Of-Materials (BOMs) to easily identify dependencies, licenses, copyrights or policy rule violations. • *Notifier*: Sends result notifications via different channels (like emails and / or JIRA tickets). Also see the list of related tools that help with running ORT. Documentation For detailed information, see the documentation on the ORT Website. Installation System requirements ORT is being continuously used on Linux, Windows and macOS by the core development team, so these operating systems are considered to be well-supported. To run the ORT binaries (also see Installation from binaries) at least Java 21 is required. Memory and CPU requirements vary depending on the size and type of project(s) to analyze / scan, but the general recommendation is to configure Java with 8 GiB of memory and to use a CPU with at least 4 cores. If ORT requires external tools to analyze a project, these tools are listed by the command. If a package manager is not listed there, support for it is integrated directly into ORT and does not require any external tools to be installed. From binaries CLI distribution Head over to the releases page. From the "Assets" section of your chosen release, download the distribution archive of the desired type. Typically that is for Windows and otherwise; but the contents of the archives are the same. The archives contain the ORT main distribution, while the archives contain the ORT helper distribution. Unpack the archive to an installation directory. The scripts to run ORT are located at and , or and , respectively. Docker distribution In addition to the CLI, ORT is also distributed as a Docker image that contains all tools required by ORT (see the command). To run ORT from the latest version of that image (which will be downloaded if needed) use: From sources Install the following basic prerequisites: • Git (any recent version will do). Then clone this repository. Build using Docker Install the following basic prerequisites: • Docker 18.09 or later (and ensure its daemon is running). • Enable BuildKit for Docker. Change into the directory with ORT's source code and run . Alternatively, use the script at which also sets the ORT version from the Git revision. Build natively Install these additional prerequisites: • Java Development Kit (JDK) version 21 or later; also remember to set the environment variable accordingly. Change into the directory with ORT's source code and run (on the first run this will bootstrap Gradle and download all required dependencies). Basic usage Depending on how ORT was installed, it can be run in the following ways: • If the Docker image was built locally as described above, use You can find further hints for using ORT with Docker in the documentation. • If the ORT distribution was built from sources, use • If running direct…