Skip to content

VIPM Platform Security

JKI is committed to the security of the vipm.io platform and helping LabVIEW software package publishers and users navigate the evolving software security landscape. As regulations like the EU Cyber Resilience Act introduce new requirements for software products, VIPM provides platform infrastructure to support publishers in meeting their security obligations, as well as static-analysis and other security tools for their software application development.

EU Cyber Resilience Act (CRA)

The CRA introduces mandatory security requirements for software products sold in the EU, with the first compliance deadline in September 2026. If you publish LabVIEW-based software or components, read our CRA overview to understand what this means for you.

Need help with CRA compliance?

JKI provides security consulting and tooling for LabVIEW-based systems.

Learn More about CRA Compliance and LabVIEW

Does the CRA apply to open source packages?

The CRA includes an exemption for open source software that is made available without commercial activity. If you publish a package under an open source license (e.g. MIT, BSD, Apache) and are not selling it or placing it on the market as part of a commercial offering, you would likely fall under that exemption.

However, if a company incorporates open source components into a commercial product sold in the EU, that company becomes responsible for CRA compliance of the overall product — including its open source dependencies. So while open source maintainers may be exempt, commercial distributors using those components are not.

The CRA is still being interpreted across EU member states, and guidance continues to evolve. If your distribution model includes paid support, bundled commercial offerings, or distribution as part of a larger product, the analysis may be different. Contact security@jki.net if you'd like to discuss your specific situation.

Static Analysis Tools and SBOM Generation for LabVIEW Software

The JKI Security Suite provides static analysis for LabVIEW applications — scanning for vulnerabilities, identifying broken VIs, and tagging findings by CWE severity for triage and remediation. It integrates into CI/CD pipelines for continuous security validation and helps organizations meet requirements such as NIST 800-53, NASA NPR 7150.2, and DISA STIG.

Looking for Security Tools?

JKI provides LabVIEW tools for analysis and SBOM generation for LabVIEW software and applications.

Learn More about Security Tools for LabVIEW

VIPM also supports Software Bill of Materials (SBOM) generation for LabVIEW software, giving package publishers a machine-readable inventory of their LabVIEW software components and dependencies. SBOMs are a key requirement of the EU Cyber Resilience Act and are increasingly expected across regulated industries. Combined with static analysis, SBOM generation gives teams visibility into both the code they write and the components they depend on.

Disclaimer

This notice is informational and not legal advice. For authoritative information about the EU CRA regulations, please visit european-cyber-resilience-act.com.

Contact

For security-related questions or to report a vulnerability in VIPM itself, contact security@jki.net.