The Cyber Resilience Act applies to free and open-source software (FOSS) only when it is supplied for distribution or use on the Union market in the course of a commercial activity (Article 2 + Recital 18). Hosting code on a forge or a package manager does not by itself trigger the regulation (Recital 20). For FOSS that is monetised — directly or as a component in monetised products — the manufacturer obligations of Article 13 apply in full. For legal persons that provide sustained support for FOSS intended for commercial activities, Article 3(14) introduces a tailored figure: the open-source software steward, with the light-touch regime of Article 24. Stewards are fully exempt from administrative fines under Article 64(10)(b). This page maps every FOSS scenario to its CRA rule. CRACheck handles the monetised-FOSS case.
€149 one-time · 8-document ZIP · 15–25 minutes · Browser-side
Each scenario below maps to a clear rule from Article 2, Article 3, Article 24 or the recitals. The line between out-of-scope FOSS and a regulated activity is the line of commercial activity.
Not automatic. Article 3(14) requires three things: (a) a legal person OTHER than the manufacturer, (b) the purpose or objective of systematically providing sustained support for FOSS products intended for commercial activities, (c) ensuring the viability of those products. A foundation that hosts an annual conference but does not steer development on a sustained basis is unlikely to qualify.
Recital 15 + 18: ‘accepting donations without the intention of making a profit should not be considered to be a commercial activity’. Only donations ‘exceeding the costs associated with the design, development and provision’ cross into commercial. A genuine cost-recovery donation model is not commercial activity for CRA purposes.
Stewards have a light-touch but real regime under Article 24: (a) a documented cybersecurity policy that fosters secure development and effective vulnerability handling by the developers of the FOSS PDE; (b) cooperation with market surveillance authorities upon request; (c) reporting of actively exploited vulnerabilities to the extent involved in development (Art. 24(3) + Art. 14(1)); (d) reporting of severe incidents to the extent they affect the steward’s network and information systems (Art. 14(3) + (8)).
Four-question self-check. If you answer YES to all four, your product is in scope of Regulation (EU) 2024/2847.
One-time payment. No subscription. The downloaded dossier is yours forever.
8 PDF documents generated from your data. Each cites the specific article of Regulation (EU) 2024/2847 it complies with.
Determines whether your product is Default, Important Class I, Important Class II (Annex III) or Critical (Annex IV). Documents the rationale and the applicable conformity assessment procedure under Article 32.
Article 31 + Annex VII dossier. Product description, design and development, vulnerability handling processes, risk assessment, list of harmonised standards applied, conformity solutions.
Annex I, Part I analysis. Intended purpose, reasonably foreseeable use, operational environment, applicability of each essential requirement, mitigation measures.
Annex II. Manufacturer details, single point of contact, intended purpose, support period end date, secure decommissioning, automatic-update opt-out instructions.
Article 28 + Annex V. Pre-structured with your classification, applicable conformity module, harmonised standards or certificates relied on, notified body number when applicable.
Annex I, Part II, point (5). Single point of contact, intake workflow, triage and remediation timeline, public disclosure rules.
Article 14 reporting. Pre-filled 24h early warning, 72h vulnerability/incident notification, 14-day final report templates.
Personalised milestones: Article 14 reporting starts 11 September 2026, full application 11 December 2027, document retention 10 years, support period (Art. 13(8)) end date.
See before you buy — Download sample dossier (PDF, fictional company). Real structure, real articles, real format. Fictional data.
Generated from your data, in your browser. No data leaves your device.
Every article and recital cited on this page comes from the official text of Regulation (EU) 2024/2847 (Cyber Resilience Act), published in the Official Journal of the European Union on 20 November 2024 (ELI: data.europa.eu/eli/reg/2024/2847/oj).
Related: Regulation (EU) 2019/881 (Cybersecurity Act, EUCC) · Directive (EU) 2022/2555 (NIS2) · Regulation (EU) 2019/1020 (market surveillance) · Regulation (EU) 2024/1689 (AI Act).
This is not legal advice. CRACheck is structured self-assessment software based on Regulation (EU) 2024/2847. The dossier you download is structured documentation, not a third-party audit or certification.
Class II and Critical products still need a notified body. CRACheck prepares the dossier that the notified body will examine — it does not replace the third-party conformity assessment required by Article 32(3) and Article 32(4).
Maximum liability: the amount you paid for the licence. Always verify your specific situation with your legal counsel.
CRACheck classifies your FOSS activity against Articles 2, 3(14), 3(48), 13, 24 and 32(5). For commercial FOSS in scope, generates the full Article 13 dossier. For stewards, generates the Article 24 cybersecurity policy.
Generate dossier — €149