-
Notifications
You must be signed in to change notification settings - Fork 475
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
CVEs on goss #973
Comments
@dklimpel @aelsabbahy we ready to help add CVE detection on CI. |
hi @dklimpel @aelsabbahy did you have some time to look at this? |
Please let me know if the newest version resolves the issue for you. |
@aelsabbahy unfortunately we replaced goss to another solution, because we have strict SLA on fixing critical CVEs. |
Curious which solution you ended up going with. I'll let you know once we have nightly CVE checks in case that changes anything in the future. Many thanks for filing these and bringing this aspect to my attention as an enhancement to the release process. |
Thank you too, I super glad that we have such good communication :)
Instead of using generic tools for healthchecking, we found optimised for our use case - health check for syslog server by syslog-ng |
Describe the bug
1 High, 2 Medium CVEs on goss
How To Reproduce
Use trivy to detect CVE
Expected Behavior
Clear CVE report
Actual Behavior
Reported CVEe
Environment:
goss v0.4.8
alpine 3.20.3
The text was updated successfully, but these errors were encountered: