diff --git a/gcp/website/frontend3/src/templates/home.html b/gcp/website/frontend3/src/templates/home.html index bb2c70093d1..f9a5b59e602 100644 --- a/gcp/website/frontend3/src/templates/home.html +++ b/gcp/website/frontend3/src/templates/home.html @@ -7,7 +7,7 @@ + media="(min-width: 768px)" onload="this.media='all'"> @@ -19,8 +19,10 @@

A distributed vulnerability database for Open Source

-

An open, precise, and distributed approach to producing and consuming vulnerability information for open +

An open, precise, and distributed approach to producing and consuming vulnerability information for + open source. +

@@ -128,7 +130,8 @@

OSV schema

OSV Schema Blog post + href="https://security.googleblog.com/2021/06/announcing-unified-vulnerability-schema.html">Blog + post
@@ -144,7 +147,7 @@

Data sources

Learn more + aria-label="Learn more about our data sources">Learn more
@@ -160,7 +163,9 @@

Query by commit hash

'{"commit": "6879efc2c1596d11a6a6ad296f80063b558d5e0f"}' \ "https://api.osv.dev/v1/query" - content_copy + + content_copy +
@@ -170,13 +175,16 @@

Query by version number

"package": {"name": "jinja2", "ecosystem": "PyPI"}}' \ "https://api.osv.dev/v1/query" - content_copy + + content_copy +
- API Documentation + API + Documentation
@@ -191,7 +199,9 @@

Install OSV‑Scanner

go install github.com/google/osv-scanner/v2/cmd/osv-scanner@v2 - content_copy + + content_copy +
@@ -202,7 +212,9 @@

Scan SBOM or Lockfiles

osv-scanner --lockfile=package-lock.json - content_copy + + content_copy +
@@ -211,7 +223,9 @@

Scan directory recursively

osv-scanner -r path/to/your/project - content_copy + + content_copy +
@@ -232,7 +246,9 @@

Guided Remediation (basic)

osv-scanner fix --non-interactive --strategy=relock -M path/to/package.json -L path/to/package-lock.json - content_copy + + content_copy +
@@ -241,43 +257,93 @@

Guided Remediation (interactive)

osv-scanner fix -M path/to/package.json -L path/to/package-lock.json - content_copy + + content_copy +
+ +
- More details + More details
-
-

GitHub Workflows

+
+

Container Image Scanning

- OSV-Scanner also provides reusable GitHub workflows that can be easily integrated into CI/CD pipelines to provide - continuous vulnerability scanning coverage. This can scan newly added dependencies in pull requests for introduced - vulnerabilities, as well as perform regular vulnerability scans for the entire project.

-
- Screenshot of OSV-Scanner GitHub Action + You can use + OSV-Scanner + to scan your container images for known vulnerabilities. +

+ + +
+
+
+

Scan container image

+
+osv-scanner scan image --serve alpine:3.12
+          
+ + + content_copy + + +
+
-
- Learn more + + +
+ Screenshot of container scan HTML output
-
-
-

Open source

-

- This project is open source. If you have any ideas or questions, - please feel free to - reach out by creating an issue! -

-
- Learn more + + +
+

GitHub Workflows

+

OSV-Scanner also provides reusable GitHub workflows that can be easily + integrated into CI/CD pipelines to provide continuous vulnerability scanning coverage. This can scan + newly added dependencies in pull requests for introduced vulnerabilities, as well as perform regular + vulnerability scans for the entire project.

+
Screenshot of OSV-Scanner GitHub Action
+ +
+ +
+

Open source

+

This project is open source. If you + have any ideas or questions, please feel free to reach out by creating an issue!

+ +
-
-
-{% endblock %} + +
{% endblock %} \ No newline at end of file diff --git a/gcp/website/frontend3/static/img/container-scan-html.png b/gcp/website/frontend3/static/img/container-scan-html.png new file mode 100644 index 00000000000..298f5205d9b Binary files /dev/null and b/gcp/website/frontend3/static/img/container-scan-html.png differ diff --git a/gcp/website/frontend3/webpack.dev.js b/gcp/website/frontend3/webpack.dev.js index b5dcb63499e..5d3c4ca110b 100644 --- a/gcp/website/frontend3/webpack.dev.js +++ b/gcp/website/frontend3/webpack.dev.js @@ -35,7 +35,7 @@ module.exports = { plugins: [ new CopyPlugin({ patterns: [ - { from: './src/templates/*.html', to: '[name].html' }, + { from: './src/templates', to: '.', globOptions: { ignore: ['**/base.html'] } }, { from: './img/*', to: 'static/img/[name][ext]' }, ], }),