The EU Cyber Resilience Act (CRA) establishes mandatory cybersecurity requirements for products with digital elements placed on the European market. One of its core obligations is the publication of a Software Bill of Materials (SBOM) — a machine-readable inventory of every software component, library, and dependency included in a product.
Signal18 publishes a CycloneDX SBOM for every release of replication-manager to help operators, integrators, and auditors understand the full composition of the software they deploy.
The CRA entered into force in November 2024. Its obligations phase in over a transition period:
| Date | Obligation |
|---|---|
| September 2026 | Vulnerability and incident reporting obligations apply |
| December 2027 | All other CRA requirements fully apply |
For a product like replication-manager the main obligations are:
The CRA contains an exemption (Recital 18) for purely community-developed open-source software that is not commercialized. replication-manager is developed by Signal18 as part of a commercial offering. Signal18 therefore treats its CRA obligations as applying in full and has taken proactive steps to comply ahead of the mandatory deadlines.
replication-manager's SBOM uses the CycloneDX 1.6 format (JSON). CycloneDX is a widely supported open standard for SBOM, maintained by OWASP, and natively understood by most vulnerability scanners and supply-chain security tools.
The SBOM is generated automatically using Anchore's SBOM Action (backed by Syft) on every published GitHub release.
Each SBOM lists the 279 direct and transitive Go module dependencies of replication-manager, including:
pkg:golang/ formatThe root component entry identifies the exact build:
{
"type": "library",
"name": "github.com/signal18/replication-manager",
"version": "v3.0.x",
"purl": "pkg:golang/github.com/signal18/[email protected]?type=module&goos=linux&goarch=amd64"
}
The SBOM is attached as a release asset to every GitHub release:
https://github.com/signal18/replication-manager/releases/latest
→ sbom-cyclonedx.json
A development snapshot (sbom.json, generated with cyclonedx-gomod) is also committed to the repository root and updated with significant dependency changes.
To regenerate the SBOM from source (requires cyclonedx-gomod):
cyclonedx-gomod mod -json -licenses -output sbom.json .
Or using Syft (produces the same CycloneDX 1.6 output):
syft packages . --output cyclonedx-json=sbom-cyclonedx.json
Feed the SBOM into any CycloneDX-compatible scanner to identify known CVEs in replication-manager's dependencies:
# Grype (Anchore)
grype sbom:sbom-cyclonedx.json
# OSV-Scanner (Google)
osv-scanner --sbom sbom-cyclonedx.json
# Trivy (Aqua)
trivy sbom sbom-cyclonedx.json
Import the SBOM into your organization's SCA or ASPM platform (Dependency-Track, FOSSA, Snyk, etc.) to track replication-manager as a dependency in your own software inventory. Most platforms accept CycloneDX JSON natively.
The SBOM includes SPDX license expressions for each dependency. Use this to verify that the license obligations of all included components are compatible with your organization's policies before deployment.
Security vulnerabilities in replication-manager should be reported privately to Signal18 before public disclosure. Contact:
Please include:
| Milestone | Target |
|---|---|
| Acknowledgement of report | 48 hours |
| Triage and severity assessment | 7 days |
| Fix available for critical/high | 30 days |
| Public disclosure | Coordinated with reporter |
Signal18 follows a coordinated disclosure model: fixes are prepared and made available before public disclosure. Reporters are credited unless they request anonymity.
Confirmed vulnerabilities are published as GitHub Security Advisories on the replication-manager repository. Subscribe to repository notifications to receive alerts.
Release artifacts are signed to allow integrity verification. The public key and signature files are published alongside each release on the GitHub releases page.
| Document | Summary |
|---|---|
| EU CRA (Regulation 2024/2847) | Full text of the Cyber Resilience Act |
| ENISA CRA guidance | ENISA implementation guidance |
| CycloneDX specification | SBOM format specification |
| OWASP CycloneDX | OWASP project page |