We use cookies for analytics and error tracking.

Tracer

Supplier security based on real data.

Automatic analysis of your suppliers' security maturity — based on publicly available signals, not questionnaires.

Tracer

The Moment

You get the questionnaire back. 47 questions, all answered. "Yes, we have a security process." "Yes, we respond to vulnerabilities." "Yes, we have a PSIRT." Sounds good. Check.

Then the CVE comes. Critical, in a component from this supplier. You look for a security.txt — doesn't exist. CVD policy? None. CSAF advisory? Nothing. The score: 25 out of 100.

With Tracer you would have known beforehand. Not because someone checked "Yes", but because Tracer checks what's really there: security.txt, CVD policy, CSAF feed, PSIRT. Real signals instead of self-assessment.

Features

Supply chain security based on facts — not on trust.

Automatic Supplier Detection

Tracer automatically detects suppliers from your product data and component lists — no manual table maintenance.

security.txt Detection

Tracer automatically checks whether your suppliers have published a security.txt according to RFC 9116 — the first indicator of security maturity.

CVD Policy Detection

Does the supplier have a Coordinated Vulnerability Disclosure Policy? Tracer finds out and evaluates the quality.

CSAF Feed Detection

Tracer detects whether suppliers publish CSAF advisories — machine-readable security notices according to international standards.

PSIRT Analysis

Does the supplier have a Product Security Incident Response Team? Tracer analyzes the publicly available information.

Maturity Level (0-5)

The maturity level shows at a glance how far a supplier is in their security maturity — from "no signals" to "best practice".

How Tracer works

1

Suppliers detected

Tracer automatically detects suppliers from your product data — or you add them manually.

2

Security presence analyzed

Tracer scans the public security presence of each supplier: security.txt, CVD policy, CSAF feed, PSIRT.

3

Scores calculated

From the detected signals, Tracer calculates a security score (0-100) and a maturity level (0-5).

4

Risks identified

The risk matrix shows you immediately which suppliers are critical — and why.

5

Continuous monitoring

Tracer continuously monitors changes. If a supplier removes their security.txt, you see it immediately.

Cyber Resilience Act

September 11, 2026.

From then on, product security is a legal obligation. No evidence, no CE marking.

176
Days
:
15
Hrs
:
27
Min
:
34
Sec

Measure supplier security, don't estimate it.

Automatic analysis of your suppliers' security maturity — without questionnaires.