Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/greenbone/gvm-libs
Greenbone Vulnerability Management Libraries
https://github.com/greenbone/gvm-libs
c extended greenbone libraries openvas tooling vulnerability vulnerability-detection vulnerability-management vulnerability-scanners
Last synced: about 17 hours ago
JSON representation
Greenbone Vulnerability Management Libraries
- Host: GitHub
- URL: https://github.com/greenbone/gvm-libs
- Owner: greenbone
- License: gpl-2.0
- Created: 2017-12-11T18:10:21.000Z (almost 7 years ago)
- Default Branch: main
- Last Pushed: 2024-10-28T14:19:49.000Z (10 days ago)
- Last Synced: 2024-10-28T17:18:44.312Z (10 days ago)
- Topics: c, extended, greenbone, libraries, openvas, tooling, vulnerability, vulnerability-detection, vulnerability-management, vulnerability-scanners
- Language: C
- Homepage:
- Size: 7.26 MB
- Stars: 84
- Watchers: 16
- Forks: 79
- Open Issues: 7
-
Metadata Files:
- Readme: README.md
- Changelog: CHANGELOG.md
- License: COPYING
- Codeowners: .github/CODEOWNERS
Awesome Lists containing this project
README
![Greenbone Logo](https://www.greenbone.net/wp-content/uploads/gb_new-logo_horizontal_rgb_small.png)
# gvm-libs
[![GitHub releases](https://img.shields.io/github/release/greenbone/gvm-libs.svg)](https://github.com/greenbone/gvm-libs/releases)
[![Build and test C](https://github.com/greenbone/gvm-libs/actions/workflows/ci-c.yml/badge.svg)](https://github.com/greenbone/gvm-libs/actions/workflows/ci-c.yml)This is the libraries module for the Greenbone Community Edition.
It is used for the Greenbone Enterprise appliances and provides various
functionalities to support the integrated service daemons.## Releases

All [release files](https://github.com/greenbone/gvm-libs/releases) are signed with
the [Greenbone Community Feed integrity key](https://community.greenbone.net/t/gcf-managing-the-digital-signatures/101).
This gpg key can be downloaded at https://www.greenbone.net/GBCommunitySigningKey.asc
and the fingerprint is `8AE4 BE42 9B60 A59B 311C 2E73 9823 FAA6 0ED1 E580`.## Installation
This module can be configured, built and installed with following commands:
cmake .
make installFor detailed installation requirements and instructions, please see the file
[INSTALL.md](INSTALL.md).If you are not familiar or comfortable building from source code, we recommend
that you use the Greenbone Security Manager TRIAL (GSM TRIAL), a prepared virtual
machine with a readily available setup. Information regarding the virtual machine
is available at .## Usage
The `gvm-libs` module consists of the following libraries:
- `base`: All basic modules which require only the `glib` library as a dependency.
- `util`: All modules that require more than the `glib` library as dependency.
- `gmp`: API support for the Greenbone Management Protocol (GMP).
- `osp`: API support for the Open Scanner Protocol (OSP).
For more information on using the functionality provided by the `gvm-libs`
module please refer to the source code documentation.## Support
For any question on the usage of `gvm-libs` please use the [Greenbone Community
Portal](https://community.greenbone.net/). If you found a problem with the
software, please [create an issue](https://github.com/greenbone/gvm-libs/issues)
on GitHub. If you are a Greenbone customer you may alternatively or additionally
forward your issue to the Greenbone Support Portal.## Maintainer
This project is maintained by [Greenbone AG](https://www.greenbone.net/).
## Contributing
Your contributions are highly appreciated. Please [create a pull
request](https://github.com/greenbone/gvm-libs/pulls) on GitHub. Bigger changes
need to be discussed with the development team via the [issues section at
github](https://github.com/greenbone/gvm-libs/issues) first.### Code style and formatting
Before creating a pull request, it is recommended to run the following command:
make format
This reformats the new code to ensure that it follows the code style and
formatting guidelines.### Static code analysis with the Clang Static Analyzer
If you want to use the Clang Static Analyzer (http://clang-analyzer.llvm.org/)
to do a static code analysis, you can do so by prefixing the configuration and
build commands with `scan-build`:scan-build cmake ..
scan-build makeThe tool will provide a hint on how to launch a web browser with the results.
It is recommended to do this analysis in a separate, empty build directory and
to empty the build directory before `scan-build` call.## License
Copyright (C) 2009-2022 [Greenbone AG](https://www.greenbone.net/)
Licensed under the [GNU General Public License v2.0 or later](COPYING).