Transparent Products
The products listed below are authorized by the Vendor for public disclosure. Select any product to inspect its linked microservice images, version history, and live stability status.
NOTES:
✅ End-to-End Automation & Legislative Compliance:
Powered by embedded microservices, the Microservice Store automates the entire process from Edge-to-Cloud, including reporting to legislative platforms.
It generates module-level (service/container) SBOMs (Software Bill of Materials) and vulnerability reports, enabling both vendors and the EU CRA to identify and mitigate risks rapidly.
These granular SBOMs include Module IDs, cryptographic hashes, versions, and module-specific low-level vulnerability data for developers.
✅ Proactive Security Framework:
Beyond standard reporting, the integrated Security Manager—operating within the embedded Microservice Runtime—takes proactive measures.
In the event of a vulnerability, it automatically quarantines malicious or malfunctioning modules in the IoT device to safeguard the integrity of the system and ensure uninterrupted device operations.
Neuralock
by
Smart Products Ltd
EU CRA Reporting Active
: authorised by vendor, automated by Microservice Store
EU CRA Reporting Active
: authorised by vendor, automated by Microservice Store
| Image Name | Category | Version | Hash | Security |
|---|---|---|---|---|
| Runtime | System > Runtime | v 1.0 | C25C..405F | |
| Lifecycle Microservice | System > Lifecycle | v 1.0 | CD68..DE85 | |
| AWS IoT Device | Connectivity > Cloud | v 1.0 | 57CE..3F77 |
|
| AWS IoT Device Test | Vendor > Application | v 1.0 | 704F..7F0A |
Failing Test Product
by
Smart Products Ltd
| Image Name | Category | Version | Hash | Security |
|---|---|---|---|---|
| Runtime | System > Runtime | v 1.0 | C25C..405F | |
| Lifecycle Microservice | System > Lifecycle | v 1.0 | CD68..DE85 | |
| Tiny AES | Cryptography > Cryptography | v 1.1 | D4C1..D2F7 |
|
| Tiny AES Test | Vendor > Application | v 1.0 | 2701..68FF |
Vulnerable Microservices
A live list of microservice versions across the ecosystem currently identified as vulnerable. Vendors are notified automatically through the Microservice Store edge-to-cloud automation.
NOTES:
✅ End-to-Cloud Vulnerability Reporting Automation
These vulnerability reports are generated by the field devices that running the microservices.
the integrated Security Manager, operating within the embedded Microservice Runtime, isolates each Microservice, and in the event of a vulnerability, it automatically quarantines malicious or malfunctioning microservices in the IoT device and reports to the Microservice Store.