Introduction¶
Thank you for choosing ONEKEY, a leading product cybersecurity solution designed for:
- Harvesting components from compiled binaries
- Generating SBOMs
- Identifying both known and unknown vulnerabilities
- Ensuring compliance
and much more.
This documentation was created to help both new customers and seasoned ONEKEY professionals. Select a section that best suits your experience:
-
New users
The basics of using ONEKEY without the finer details. Tons of images to help you with onboarding!
-
Experienced users
Spent some time with the platform but still don't know how to search for a specific CVE or disable monitoring? Check out the Features section to learn how to get the most out of the platform.
-
ONEKEY veterans
You've been using ONEKEY for years, you've heard about unblob, you read the changelogs, you might even use the public API. Peek under the hood and see how ONEKEY identifies and mitigates security risks.
Special users
- If you are a new ONEKEY admin, check the Admin guide.
- If you are a developer trying to integrate ONEKEY see the Integration guide.
We hope you find everything you need here, but if you need further help, you can always reach out by filling our contact form or emailing us at support@onekey.com.