|
6 | 6 | - [Fixing Known Issues / What should I do if it finds something?](#fixing-known-issues--what-should-i-do-if-it-finds-something)
|
7 | 7 | - [Limitations](#limitations)
|
8 | 8 | - [Optional Arguments:](#optional-arguments)
|
9 |
| - - [-x, --extract](#-x---extract) |
10 | 9 | - [-u {now,daily,never}, --update {now,daily,never}](#-u-nowdailynever---update-nowdailynever)
|
| 10 | + - [-e EXCLUDE, --exclude EXCLUDE](#-e-exclude---exclude-exclude) |
11 | 11 | - [Checkers Arguments:](#checkers-arguments)
|
12 | 12 | - [-s SKIPS, --skips SKIPS](#-s-skips---skips-skips)
|
13 | 13 | - [-r CHECKERS, --runs CHECKERS](#-r-checkers---runs-checkers)
|
|
21 | 21 | - [Output verbosity](#output-verbosity)
|
22 | 22 | - [Quiet Mode](#quiet-mode)
|
23 | 23 | - [Logging modes](#logging-modes)
|
| 24 | + - [Deprecated Arguments:](#deprecated-arguments) |
| 25 | + - [-x, --extract](#-x---extract) |
24 | 26 | - [Feedback & Contributions](#feedback--contributions)
|
25 | 27 | - [Security Issues](#security-issues)
|
26 | 28 |
|
@@ -182,16 +184,15 @@ See the detailed description of [`--input-file`](#-i-input_file---input-file-inp
|
182 | 184 |
|
183 | 185 | ## Optional Arguments:
|
184 | 186 |
|
185 |
| -### -x, --extract |
186 |
| - |
187 |
| -This option allows the CVE Binary Tool to extract compressed files into a temporary directory |
188 |
| -so the contents can be scanned. If the quiet flag is not used, the list of extracted files |
189 |
| -will be printed. |
190 | 187 |
|
191 | 188 | ### -u {now,daily,never}, --update {now,daily,never}
|
192 | 189 |
|
193 | 190 | This option controls the frequency of updates for the CVE data from the National Vulnerability Database. By default, the tool checks the staleness of the data with every run, and if the data is more than one day old, it gets an update from NVD. You may also choose to update the data `now` (in which case all cached data is deleted and a full new download is done) or `never` in which case the staleness check is not done and no update is requested. The `now` and `never` modes can be combined to produce alternative update schedules if daily is not the desired one.
|
194 | 191 |
|
| 192 | +### -e EXCLUDE, --exclude EXCLUDE |
| 193 | + |
| 194 | +This option allows one the skip a comma-separated lists of paths. This can be useful for excluding certain files and directories from the scan which will also decrease the scanning time. |
| 195 | + |
195 | 196 | ## Checkers Arguments:
|
196 | 197 |
|
197 | 198 | ### -s SKIPS, --skips SKIPS
|
@@ -396,6 +397,15 @@ indicates that CVEs may be present in the code. A good result here is 0.
|
396 | 397 |
|
397 | 398 | The logging modes provide additional fine-grained control for debug information.
|
398 | 399 |
|
| 400 | +## Deprecated Arguments: |
| 401 | + |
| 402 | +### -x, --extract |
| 403 | + |
| 404 | +This option allows the CVE Binary Tool to extract compressed files into a temporary directory |
| 405 | +so the contents can be scanned. If the quiet flag is not used, the list of extracted files |
| 406 | +will be printed. |
| 407 | +CVE Binary Tool by default auto-extract all compressed files inside the directory path. You can always exclude certain paths by using `-e --exclude` |
| 408 | + |
399 | 409 | ## Feedback & Contributions
|
400 | 410 |
|
401 | 411 | Bugs and feature requests can be made via [GitHub issues](https://github.com/intel/cve-bin-tool).
|
|
0 commit comments