RFI for Generation and Vulnerability Analysis Solution
Location:
Texas, United States
Posted on:
Feb 6, 2026
Deadline:
Feb 19, 2026
Summary:
Texas seeks an enterprise solution for SBOM generation, container analysis, and vulnerability scanning to support DevSecOps initiatives.
Get full access to this RFP
Vendor needs to provide enterprise Software Bill of Materials (SBOM) generation, container analysis, and vulnerability scanning capability to support DevSecOps and Platform One operations. 1. The product must support generating SBOMs that comply with accepted industry standards (e.g., SPDX, CycloneDX). 2. The product must support generating SBOMs for common programming languages and ecosystems (e.g., npm, Maven, PyPI, Go modules, NuGet, RubyGems, Cargo). 3. The product must provide an API and or CLI to generate SBOMs during the build process (CI/CD). 4. The product should represent direct and transitive dependencies, including their relationships (e.g., which package depends on which). 5. Must support scanning container images. 6. The product must include optional metadata about repository URLs and commit hashes for each component, when available. 7. Packages listed in SBOMs should also have the PURL format. 8. The software must integrate with standard vulnerability databases, such as the National Vulnerability Database (NVD), RHSA, GHSA, and other vendor–specific feeds. 9. The product must be able to automatically check the discovered components in the SBOM against known vulnerabilities. 10. The product must map identified vulnerabilities to industry–standard severity metrics (e.g., CVSS scores). 11. The product should have mechanisms for users to mark or override false positives and provide context for false negatives. 12. The software must track changes over time to detect new vulnerabilities that affect older versions of the software. 13. Vulnerability feed content should be supplemented by custom data from security researchers to minimize false positives, especially when filtering out vulnerabilities that does not apply to containers. 14. Product need to take a container image as an input and output a vulnerability result for the container image.
