Replies: 3 comments 1 reply
-
I haven't used node really at all, so this is the package metadata as "installed" on disk, right? As in, it's not a requirements range, but one specific version? |
Beta Was this translation helpful? Give feedback.
1 reply
-
Created https://issues.redhat.com/browse/PROJQUAY-5099 to track this request. |
Beta Was this translation helpful? Give feedback.
0 replies
-
I started a draft PR to see what the implementation may look like: #834 |
Beta Was this translation helpful? Give feedback.
0 replies
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Uh oh!
There was an error while loading. Please reload this page.
-
Background
ACS's scanner supports scanning npm package.json files for vulnerabilities. ACS is looking to add this ability to ClairCore.
ClairCore now has the ability to obtain language-specific vulnerability data from OSV. OSV's database includes npm data, so ClairCore has a datasource for npm packages.
Proposal
ACS's package.json scanning support is pretty straightforward. Simply look for a regular file called
package.json
. ACS attempts to ensure this file is meant for NodeJS instead of some random file which happens to be calledpackage.json
by checking ifnode_modules
ornodejs
are in the file path, as well. Once we are sure this is a file in which we are interested, we can decode the file to look for the required fields.This may look like the following:
We may determine the related vulnerabilities by matching the package name, version, and repository (
"https://www.npmjs.com/"
).Beta Was this translation helpful? Give feedback.
All reactions