-
Notifications
You must be signed in to change notification settings - Fork 356
Open
Description
Latest govulncheck versions support outputting OpenVEX formatted documents, which can be submitted to vulnerability scanners to filter out false positives. Right now govulncheck-with-excludes.sh uses the non-standard JSON format and excludes mitigated vulnerabilities. The -json flag is now considered legacy in favor of -format.
Proposal
govulncheck-with-excludes.shshould be updated to use-format openvexinstead of-jsonand override the status of mitigated vulnerabilities fromaffectedtofixedper OpenVEX spec instead of excluding them.ci.ymlworkflow should provide the resulting VEX document as an artifact.
If that works for you, I can do it and submit a PR.
Caveats
-
OpenVEX spec is a draft:
The OpenVEX specification is currently a draft. We don't anticipate large changes, but are open to them.
It's already supported by at least Trivy and Grype.
-
x/vuln: OpenVEX report lacks affected product golang/go#68152
Probably solvable withjqingovulncheck-with-excludes.sh
Reactions are currently unavailable
Metadata
Metadata
Assignees
Labels
No labels