doc/user/application_security/comparison_dependency_and_container_scanning.md
GitLab offers both dependency scanning and container scanning to ensure coverage for all of these dependency types. To cover as much of your risk area as possible, you should use all available security scanning tools:
The following table summarizes which types of dependencies each scanning tool can detect:
| Feature | Dependency scanning | Container scanning |
|---|---|---|
| Identify the manifest, lock file, or static file that introduced the dependency | {{< yes >}} | {{< no >}} |
| Development dependencies | {{< yes >}} | {{< no >}} |
| Dependencies in a lock file committed to your repository | {{< yes >}} | {{< yes >}} <sup>1</sup> |
| Binaries built by Go | {{< no >}} | {{< yes >}} <sup>2</sup> |
| Dynamically-linked language-specific dependencies installed by the Operating System | {{< no >}} | {{< yes >}} |
| Operating system dependencies | {{< no >}} | {{< yes >}} |
| Language-specific dependencies installed on the operating system (not built by your project) | {{< no >}} | {{< yes >}} |