-
Notifications
You must be signed in to change notification settings - Fork 0
Description
Security Scan Report
Project: .
Version: 0.1.2
Scan Date: 2025-06-28
Image: ghcr.io/raw-labs/das-sqlite/das-sqlite-server:0.1.2
Summary
🔍 Vulnerability Summary
Generated on: Sat Jun 28 00:15:59 UTC 2025
Found 5 vulnerabilities
System Dependencies
Library Dependencies
From Raw Labs
In subproject: das-sqlite_2.13
• com.raw-labs:das-sqlite_2.13:0.1.2-main-SNAPSHOT -> com.raw-labs:das-server-scala_2.13:0.6.0 -> com.raw-labs:protocol-das_2.13:1.0.2 -> com.google.protobuf:protobuf-java:3.25.4 (evicted by 3.25.5)
• com.raw-labs:das-sqlite_2.13:0.1.2-main-SNAPSHOT -> com.raw-labs:das-server-scala_2.13:0.6.0 -> com.raw-labs:protocol-das_2.13:1.0.2 -> com.google.protobuf:protobuf-java:3.25.5
• com.raw-labs:das-sqlite_2.13:0.1.2-main-SNAPSHOT -> com.raw-labs:das-server-scala_2.13:0.6.0 -> com.raw-labs:protocol-das_2.13:1.0.2 -> io.grpc:grpc-protobuf:1.69.1 -> com.google.api.grpc:proto-google-common-protos:2.48.0 -> com.google.protobuf:protobuf-java:3.25.5
• com.raw-labs:das-sqlite_2.13:0.1.2-main-SNAPSHOT -> com.raw-labs:das-server-scala_2.13:0.6.0 -> com.raw-labs:protocol-das_2.13:1.0.2 -> io.grpc:grpc-protobuf:1.69.1 -> com.google.protobuf:protobuf-java:3.25.5
• com.raw-labs:das-sqlite_2.13:0.1.2-main-SNAPSHOT -> com.raw-labs:das-server-scala_2.13:0.6.0 -> com.raw-labs:protocol-das_2.13:1.0.2 -> io.grpc:grpc-netty:1.69.1 -> io.netty:netty-codec-http2:4.1.110.Final -> io.netty:netty-codec-http:4.1.110.Final -> io.netty:netty-handler:4.1.118.Final
• com.raw-labs:das-sqlite_2.13:0.1.2-main-SNAPSHOT -> com.raw-labs:das-server-scala_2.13:0.6.0 -> com.raw-labs:protocol-das_2.13:1.0.2 -> io.grpc:grpc-netty:1.69.1 -> io.netty:netty-codec-http2:4.1.110.Final -> io.netty:netty-handler:4.1.118.Final
• com.raw-labs:das-sqlite_2.13:0.1.2-main-SNAPSHOT -> com.raw-labs:das-server-scala_2.13:0.6.0 -> com.raw-labs:protocol-das_2.13:1.0.2 -> io.grpc:grpc-netty:1.69.1 -> io.netty:netty-handler-proxy:4.1.110.Final
From Third-party
Action Required
- Review all vulnerabilities
- Prioritize fixes based on severity
- Plan updates for packages with available fixes
- Document any accepted risks
This report was automatically generated by the security scan workflow.