You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: docs/github-action.md
+2-2
Original file line number
Diff line number
Diff line change
@@ -23,7 +23,7 @@ OSV-Scanner is available as a CI/CD Action. We currently offer two different reu
23
23
1. A workflow that triggers a scan with each [pull request](./github-action.md#scan-on-pull-request) and will only report new vulnerabilities introduced through the pull request.
24
24
2. A workflow that performs a full vulnerability scan, which can be configured to scan on pushes or a [regular schedule](./github-action.md#scheduled-scans). The full vulnerability scan can also be configured to run [on release](./github-action.md#scan-on-release) to prevent releasing with known vulnerabilities in dependencies.
25
25
26
-
Currently there is no prebuilt workflows for other platforms, but we welcome any contributions for this!
26
+
Currently, there is no prebuilt workflows for other platforms, but we welcome any contributions for this!
27
27
28
28
## Scan on pull request
29
29
@@ -113,7 +113,7 @@ Maintainers can review results of the scan by navigating to their project's `sec
113
113
114
114
## Scan on release
115
115
116
-
Here is a example of blocking on release, though the actual implementation will heavily depend on your specific release process.
116
+
Here is an example of blocking on release, though the actual implementation will heavily depend on your specific release process.
Copy file name to clipboardExpand all lines: docs/guided-remediation.md
+3-3
Original file line number
Diff line number
Diff line change
@@ -28,7 +28,7 @@ This tool provides several options to users for how to prioritise and remediate
28
28
29
29
- Resolution and analysis of the entire transitive graph (leveraging [deps.dev](https://deps.dev)) to determine the minimal changes required to remove vulnerabilities.
30
30
- Prioritising direct dependency upgrades by the total number of transitive vulnerabilities fixed.
31
-
- Prioritising vulnerabilities by dependency depth, severity, and whether or not to care about dev-only dependencies.
31
+
- Prioritising vulnerabilities by dependency depth, severity, and whether to care about dev-only dependencies.
32
32
- Modification of package manifest and lockfiles (e.g. `package.json`/`package-lock.json`) to fix vulnerabilities.
33
33
- Different strategies with different risk/reward ratios (e.g. in-place fixes vs relocking).
34
34
@@ -674,7 +674,7 @@ Relocking recomputes your entire dependency graph based on your manifest file, t
674
674
675
675
Selecting the "Relock" option will bring you to the relock information page. Here, you can see which vulnerabilities are present after relocking.
676
676
677
-
In addition to relocking, it may be possible to further remove vulnerabilities by bumping the required version constraints of your direct dependencies. You may choose to apply these patches by selecting them on the relock page then choosing the "Apply pending patches" option. The dependency graph will then be recomputed and you may continue to select more options.
677
+
In addition to relocking, it may be possible to further remove vulnerabilities by bumping the required version constraints of your direct dependencies. You may choose to apply these patches by selecting them on the relock page then choosing the "Apply pending patches" option. The dependency graph will then be recomputed, and you may continue to select more options.
678
678
679
679

680
680
@@ -800,7 +800,7 @@ For more information, see [Offline Mode](./offline-mode.md).
800
800
Remediation in npm `workspaces` is only partially supported:
801
801
802
802
- In-place updates should function correctly on the workspace `package-lock.json`.
803
-
- Dependency relaxation can change dependencies in the `package.json` file being being scanned. This means only dependencies declared in the root package can be changed.
803
+
- Dependency relaxation can change dependencies in the `package.json` file being scanned. This means only dependencies declared in the root package can be changed.
804
804
- You can remediate the individual `package.json` files of each workspace, but this will be unaware of any packages or constraints caused by sibling workspaces.
805
805
- The `node_modules/` in workspaces are not deleted when relocking, which may impact the resulting dependency graph when running `npm install`.
806
806
- Each workspace package is considered dependency depth 1 from the root workspace.
Copy file name to clipboardExpand all lines: docs/supported_languages_and_lockfiles.md
+2-2
Original file line number
Diff line number
Diff line change
@@ -18,7 +18,7 @@ nav_order: 2
18
18
{:toc}
19
19
</details>
20
20
21
-
Artifact and manifest extraction logic is implemented in [OSV-Scalibr](https://github.com/google/osv-scalibr) as a standalone library. OSV-Scanner tightly integrates with OSV-Scalibr to provide a end to end vulnerability scanner for developers.
21
+
Artifact and manifest extraction logic is implemented in [OSV-Scalibr](https://github.com/google/osv-scalibr) as a standalone library. OSV-Scanner tightly integrates with OSV-Scalibr to provide an end to end vulnerability scanner for developers.
22
22
23
23
## Core Concept
24
24
@@ -84,7 +84,7 @@ Vendored dependencies have been directly copied into the project folder, but do
84
84
85
85
OSV-Scanner supports transitive dependency scanning for Maven pom.xml. This feature is enabled by default when scanning, but it can be disabled using the `--no-resolve` flag. It is also disabled in the [offline mode](./offline-mode.md).
86
86
87
-
OSV-Scanner uses [deps.dev’s resolver library](https://pkg.go.dev/deps.dev/util/resolve) to compute the dependency graph of a project. This graph includes all of the direct and transitive dependencies. By default, [deps.dev API](https://docs.deps.dev/api/v3/index.html) is queried for package versions and requirements. The support for private registries is [coming soon](https://github.com/google/osv-scanner/issues/1045).
87
+
OSV-Scanner uses [deps.dev’s resolver library](https://pkg.go.dev/deps.dev/util/resolve) to compute the dependency graph of a project. This graph includes all the direct and transitive dependencies. By default, [deps.dev API](https://docs.deps.dev/api/v3/index.html) is queried for package versions and requirements. The support for private registries is [coming soon](https://github.com/google/osv-scanner/issues/1045).
88
88
89
89
After the dependency resolution, the OSV database is queried for the vulnerabilities associated with these dependencies as usual.
0 commit comments