govulncheck

Edit Package govulncheck
https://github.com/golang/vuln

govulncheck is a CLI tool to report known vulnerabilities that affect Go code. It uses static analysis of source code or a binary's symbol table to narrow down reports to only those that could affect the application.

By default, govulncheck makes requests to the Go vulnerability database at https://vuln.go.dev. Requests to the vulnerability database contain only module paths, not code or other properties of your program. See https://vuln.go.dev/privacy.html for more. Use the -db flag to specify a different database, which must implement the specification at https://go.dev/security/vuln/database.

Refresh
Refresh
Source Files
Filename Size Changed
_service 0000000711 711 Bytes
_servicedata 0000000232 232 Bytes
govulncheck-1.1.0.tar.gz 0001913050 1.82 MB
govulncheck.changes 0000008858 8.65 KB
govulncheck.spec 0000002004 1.96 KB
vendor.tar.gz 0000530147 518 KB
Latest Revision
Dominique Leuenberger's avatar Dominique Leuenberger (dimstar_suse) accepted request 1168421 from Jeff Kowalczyk's avatar Jeff Kowalczyk (jfkw) (revision 6)
- Update to version 1.1.0:
  * internal/openvex: add vex types
  * internal/sarif: compute relative paths for findings
  * internal/sarif: remove unused field
  * go.mod: update golang.org/x dependencies
  * internal/sarif,internal/scan,internal/traces: clean up tests
  * internal/sarif: add region part of the physical location
  * internal/sarif: add code flows
  * cmd/govulncheck: clean up test
  * cmd/govulncheck: make test case config data
  * cmd/govulncheck: add comment capability to fixups
  * cmd/govulncheck: remove unnecessary fixups
  * cmd/govulncheck: make fixup part of a test case
  * cmd/govulncheck: extract stdlib into special test case
  * cmd/govulncheck: restore parallelism for tests
  * cmd/govulncheck: add nogomod test case
  * cmd/govulncheck: restructure testdata tests
  * cmd/govulncheck: add sarif test for binaries
  * internal/sarif: add stacks
  * internal/sarif: add result message
  * internal/vulncheck: get correctly package for instantiated functions
  * internal/sarif: add result stubs to run object
  * internal/govulncheck: add scan mode to config
  * internal/vulncheck: delete only synthetic nodes not related to generics
  * internal/scan: add more info to validation errors
  * internal/sarif: add rules
  * internal/scan: fix name of the error variable
  * internal/sarif: add handler
  * internal/scan: add sarif flag
  * internal/scan: add types for format, show, mode, and scan flags (forwarded request 1168420 from jfkw)
Comments 0
openSUSE Build Service is sponsored by