-
Notifications
You must be signed in to change notification settings - Fork 16
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Trivy dependency scan test #85
Conversation
🔒 Security Scan Results
✅ No critical security issues detected. The code has passed all critical security checks. |
This pull request sets up GitHub code scanning for this repository. Once the scans have completed and the checks have passed, the analysis results for this pull request branch will appear on this overview. Once you merge this pull request, the 'Security' tab will show more code scanning analysis results (for example, for the default branch). Depending on your configuration and choice of analysis tool, future pull requests will be annotated with code scanning analysis results. For more information about GitHub code scanning, check out the documentation. |
@@ -1 +1,3 @@ | |||
bandit==1.7.5 | |||
bandit==1.7.5 | |||
flask==0.12.3 # Known vulnerabilities in Flask 0.12.x |
Check failure
Code scanning / Trivy
python-flask: unexpected memory usage can lead to denial of service via crafted encoded JSON data High
Installed Version: 0.12.3
Vulnerability CVE-2019-1010083
Severity: HIGH
Fixed Version: 1.0
Link: CVE-2019-1010083
@@ -1 +1,3 @@ | |||
bandit==1.7.5 | |||
bandit==1.7.5 | |||
flask==0.12.3 # Known vulnerabilities in Flask 0.12.x |
Check failure
Code scanning / Trivy
flask: Possible disclosure of permanent session cookie due to missing Vary: Cookie header High
Installed Version: 0.12.3
Vulnerability CVE-2023-30861
Severity: HIGH
Fixed Version: 2.3.2, 2.2.5
Link: CVE-2023-30861
bandit==1.7.5 | ||
bandit==1.7.5 | ||
flask==0.12.3 # Known vulnerabilities in Flask 0.12.x | ||
requests==2.18.4 # SSL issues in older Requests versions |
Check failure
Code scanning / Trivy
python-requests: Redirect from HTTPS to HTTP does not remove Authorization header High
Installed Version: 2.18.4
Vulnerability CVE-2018-18074
Severity: HIGH
Fixed Version: 2.20.0
Link: CVE-2018-18074
bandit==1.7.5 | ||
bandit==1.7.5 | ||
flask==0.12.3 # Known vulnerabilities in Flask 0.12.x | ||
requests==2.18.4 # SSL issues in older Requests versions |
Check warning
Code scanning / Trivy
python-requests: Unintended leak of Proxy-Authorization header Medium
Installed Version: 2.18.4
Vulnerability CVE-2023-32681
Severity: MEDIUM
Fixed Version: 2.31.0
Link: CVE-2023-32681
bandit==1.7.5 | ||
bandit==1.7.5 | ||
flask==0.12.3 # Known vulnerabilities in Flask 0.12.x | ||
requests==2.18.4 # SSL issues in older Requests versions |
Check warning
Code scanning / Trivy
requests: subsequent requests to the same host ignore cert verification Medium
Installed Version: 2.18.4
Vulnerability CVE-2024-35195
Severity: MEDIUM
Fixed Version: 2.32.0
Link: CVE-2024-35195
Repo scan results appear in the Security Tab under Code Security for PR #85 |
Trivy scan and Reviewdog comments work as expected. Not merging due to test vulnerable dependencies in requirements.txt |
This should scan the repo and add any vulnerable dependencies to the GitHub Security tab, then scan the altered files in the PR and add comments for each vulnerable dependency found.