-
Notifications
You must be signed in to change notification settings - Fork 370
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Scan manifest files as well (not just lockfiles) #416
Comments
Would this also help with cases where the project being analyzed is the one with vulnerabilities (as opposed to dependencies)? For example, consider the archived npm package parsejson, which has an advisory against it.
Or is |
It'll be good to add support to find vulns in the project being analyzed. The only way we are doing it currently is by git commit, which we only really enumerate for C/C++ advisories, which is why osv-scanner did not return a result. Couple issues I can think of:
|
This issue has not had any activity for 60 days and will be automatically closed in two weeks |
Automatically closing stale issue |
Silly question: why not just generate the package-lock.json at scan time? Is the desire to not have to clone the repo and do this? |
I think to generate the lockfile at scan time is more like "relock" - the generated lockfile may be different. |
Add the ability to scan manifest files e.g.
package.json
in addition topackage-lock.json
. Possibly using deps.dev dependency graph data to scan transitive dependencies.Motivation: Some projects don't check in their package-lock.json files, breaking automated repo scanning that's done by projects like scorecard. E/.g see #410
Related #352
The text was updated successfully, but these errors were encountered: