Skip to content

Introduction

Thank you for choosing ONEKEY, a leading product cybersecurity solution designed for:

  • Harvesting components from compiled binaries
  • Generating SBOMs
  • Identifying both known and unknown vulnerabilities
  • Ensuring compliance

and much more.

This documentation was created to help both new customers and seasoned ONEKEY professionals. Select a section that best suits your experience:

  • New users


    The basics of using ONEKEY without the finer details. Tons of images to help you with onboarding!

    Getting started

  • Experienced users


    Spent some time with the platform but still don't know how to search for a specific CVE or disable monitoring? Check out the Features section to learn how to get the most out of the platform.

    Features

  • ONEKEY veterans


    You've been using ONEKEY for years, you've heard about unblob, you read the changelogs, you might even use the public API. Peek under the hood and see how ONEKEY identifies and mitigates security risks.

    How do we analyze?

Special users

We hope you find everything you need here, but if you need further help, you can always reach out by filling our contact form or emailing us at support@onekey.com.