Replies: 3 comments 1 reply
-
I haven't used node really at all, so this is the package metadata as "installed" on disk, right? As in, it's not a requirements range, but one specific version? |
Beta Was this translation helpful? Give feedback.
1 reply
-
Created https://issues.redhat.com/browse/PROJQUAY-5099 to track this request. |
Beta Was this translation helpful? Give feedback.
0 replies
-
I started a draft PR to see what the implementation may look like: #834 |
Beta Was this translation helpful? Give feedback.
0 replies
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
-
Background
ACS's scanner supports scanning npm package.json files for vulnerabilities. ACS is looking to add this ability to ClairCore.
ClairCore now has the ability to obtain language-specific vulnerability data from OSV. OSV's database includes npm data, so ClairCore has a datasource for npm packages.
Proposal
ACS's package.json scanning support is pretty straightforward. Simply look for a regular file called
package.json
. ACS attempts to ensure this file is meant for NodeJS instead of some random file which happens to be calledpackage.json
by checking ifnode_modules
ornodejs
are in the file path, as well. Once we are sure this is a file in which we are interested, we can decode the file to look for the required fields.This may look like the following:
We may determine the related vulnerabilities by matching the package name, version, and repository (
"https://www.npmjs.com/"
).Beta Was this translation helpful? Give feedback.
All reactions