Skip to content

Commit ace20b1

Browse files
merged main
2 parents 5ec4193 + 5059121 commit ace20b1

File tree

31 files changed

+342
-1037
lines changed

31 files changed

+342
-1037
lines changed

.circleci/config.yml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ references:
99
persist_to_workspace: true
1010
# https://aquasecurity.github.io/trivy/v0.65/getting-started/installation/#install-script
1111
cmd: |
12-
curl -sfL https://raw.githubusercontent.com/aquasecurity/trivy/main/contrib/install.sh | sh -s -- -b . v0.65.0
12+
curl -sfL https://raw.githubusercontent.com/aquasecurity/trivy/main/contrib/install.sh | sh -s -- -b . v0.66.0
1313
mkdir cache
1414
./trivy --cache-dir ./cache image --download-db-only
1515
# Download OpenSSF malicious packages database
@@ -23,7 +23,7 @@ references:
2323
build_and_publish_docker: &build_and_publish_docker
2424
persist_to_workspace: true
2525
cmd: |
26-
docker build --no-cache -t $CIRCLE_PROJECT_REPONAME:latest --build-arg TRIVY_VERSION=0.65.0 .
26+
docker build --no-cache -t $CIRCLE_PROJECT_REPONAME:latest --build-arg TRIVY_VERSION=0.66.0 .
2727
docker save --output docker-image.tar $CIRCLE_PROJECT_REPONAME:latest
2828
2929
workflows:

docs/multiple-tests/all-patterns/patterns.xml

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,6 @@
11
<?xml version="1.0" encoding="UTF-8"?>
22
<module name="root">
33
<module name="secret" />
4-
<module name="vulnerability" />
54
<module name="vulnerability_critical" />
65
<module name="vulnerability_high" />
76
<module name="vulnerability_medium" />

docs/multiple-tests/all-patterns/results.xml

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -22,16 +22,16 @@
2222
severity="warning"
2323
/>
2424
<error
25-
source="vulnerability"
25+
source="vulnerability_critical"
2626
line="2"
2727
message="Insecure dependency maven/org.apache.dolphinscheduler/[email protected] (CVE-2024-43202: Apache Dolphinscheduler Code Injection vulnerability) (update to 3.2.2)"
2828
severity="error"
2929
/>
3030
<error
31-
source="vulnerability"
31+
source="vulnerability_high"
3232
line="3"
3333
message="Insecure dependency maven/org.apache.seatunnel/[email protected] (CVE-2023-49198: Apache SeaTunnel SQL Injection vulnerability) (update to 1.0.1)"
34-
severity="error"
34+
severity="high"
3535
/>
3636
<error
3737
source="vulnerability_medium"
Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,4 @@
11
org.apache.logging.log4j:log4j-core:2.17.0
22
org.apache.dolphinscheduler:dolphinscheduler-task-api:3.2.1
33
org.apache.seatunnel:seatunnel:1.0.0
4-
org.apache.cxf:cxf-rt-transports-http:4.0.0
5-
npm:commitlint-pm2-proxima-dotenv-safe:1.0.0
4+
org.apache.cxf:cxf-rt-transports-http:4.0.0

docs/multiple-tests/pattern-vulnerability/patterns.xml

Lines changed: 0 additions & 4 deletions
This file was deleted.

docs/multiple-tests/pattern-vulnerability/results.xml

Lines changed: 0 additions & 215 deletions
This file was deleted.

docs/multiple-tests/pattern-vulnerability/src/c/conan.lock

Whitespace-only changes.

docs/multiple-tests/pattern-vulnerability/src/csharp/packages.lock.json

Whitespace-only changes.

docs/multiple-tests/pattern-vulnerability/src/csharp/sample.deps.json

Whitespace-only changes.

docs/multiple-tests/pattern-vulnerability/src/dart/pubspec.lock

Lines changed: 0 additions & 85 deletions
This file was deleted.

0 commit comments

Comments
 (0)