Company Logo

IoT Transparency Portal (Beta)

Live security status and vulnerability disclosure for IoT Entities.

Database Status

Live & Synchronized

Transparent Products

The products listed below are authorized by the Vendor for public disclosure. Select any product to inspect its linked microservice images, version history, and live stability status.

NOTES:
End-to-End Automation & Legislative Compliance:
Powered by embedded microservices, the Microservice Store automates the entire process from Edge-to-Cloud, including reporting to legislative platforms. It generates module-level (service/container) SBOMs (Software Bill of Materials) and vulnerability reports, enabling both vendors and the EU CRA to identify and mitigate risks rapidly. These granular SBOMs include Module IDs, cryptographic hashes, versions, and module-specific low-level vulnerability data for developers.

Proactive Security Framework:
Beyond standard reporting, the integrated Security Manager—operating within the embedded Microservice Runtime—takes proactive measures. In the event of a vulnerability, it automatically quarantines malicious or malfunctioning modules in the IoT device to safeguard the integrity of the system and ensure uninterrupted device operations.

Neuralock by Smart Products Ltd
EU CRA Reporting Active
Image Name Category Version Hash Security
Runtime System > Runtime v 1.0 C25C..405F
Lifecycle Microservice System > Lifecycle v 1.0 CD68..DE85
AWS IoT Device Connectivity > Cloud v 1.0 57CE..3F77
AWS IoT Device Test Vendor > Application v 1.0 704F..7F0A
Failing Test Product by Smart Products Ltd
Image Name Category Version Hash Security
Runtime System > Runtime v 1.0 C25C..405F
Lifecycle Microservice System > Lifecycle v 1.0 CD68..DE85
Tiny AES Cryptography > Cryptography v 1.1 D4C1..D2F7
Tiny AES Test Vendor > Application v 1.0 2701..68FF

Vulnerable Microservices

A live list of microservice versions across the ecosystem currently identified as vulnerable. Vendors are notified automatically through the Microservice Store edge-to-cloud automation.

NOTES:
End-to-Cloud Vulnerability Reporting Automation
These vulnerability reports are generated by the field devices that running the microservices.
the integrated Security Manager, operating within the embedded Microservice Runtime, isolates each Microservice, and in the event of a vulnerability, it automatically quarantines malicious or malfunctioning microservices in the IoT device and reports to the Microservice Store.

AWS / AWS IoT Device v 1.0 | Hash : 57CE..3F77
Kokke / Tiny AES v 1.1 | Hash : D4C1..D2F7