Skip to main content
Version: 1.4.1

What's New

Product Version

1.4.1

Release Date

December 18, 2025

Brief Description

This release focuses on product performance optimization, integration with even more leading security tools, and the implementation of AI-powered analysis.

Summary

  • VEX report generation
  • AI analysis for False-positive detection
  • Change in the method for identifying recurring issue triggers
  • New integration with GitLeaks
  • Expansion of report generation parameters
  • as well as other pleasant UI/UX improvements and system capability enhancements.

What's New (New Features)

VEX Reports

Support for the VEX format (Vulnerability Exploitability eXchange) has been implemented for the automatic generation, storage, and export of vulnerability exploitability information in the context of products and components.

What has changed for the user: The ability to generate VEX reports for scans has been added to obtain more detailed information about the status of potential vulnerabilities.

AI Analysis for False-positive

For TRON.ASOC users with an AI Agent, the capability has been added to run AI analysis for False-positive detection on specific security issues on local infrastructure.

Improvements (Improvements & Enhancements)

Transition to Using Hash Sets

The method for tracking duplicate security issues has been changed by utilizing hash sets.

What has changed for the user: The system now better distinguishes recurring security issue findings.

Expansion of Report Generation Parameters

New fields for display in reports have been added, and the list of available filtering parameters when generating summary and detailed reports has been expanded.

Fixes (Bug Fixes)

Corrected Display of HTML Reports

The display of HTML format reports for Aqua Security tool scans has been fixed.

New Integrations (Integrations)

Gitleaks

A CLI integration with the Gitleaks secret detection tool has been implemented. It is designed for static code analysis to detect the presence of confidential data, such as passwords or API keys, which have been included in the source code in plain text without using variables or configuration files.

Upgrade Instructions

Feedback and Support

Conclusion

We continue to develop the product, constantly improving the user experience and system interaction processes.