An open API service indexing awesome lists of open source software.

https://github.com/iosifache/osv-scanner-snap

The OSV-Scanner vulnerability scanner as a snap 📦
https://github.com/iosifache/osv-scanner-snap

code-scanning osv-dev snapcraft

Last synced: 3 months ago
JSON representation

The OSV-Scanner vulnerability scanner as a snap 📦

Awesome Lists containing this project

README

          



OSV-Scanner logo


Vulnerability scanner for project's dependencies




Snapcraft's Version

   

PyPI's Version

   

GitHub Build Workflow Status

# Description

OSV-Scanner is a vulnerability scanner that examines your project's list of dependencies and reports any vulnerabilities that affect the versions you're using. The goal of this repository is to package OSV-Scanner as a (community) snap that can be effortlessly installed across a variety of Linux distributions.

[![Get it from the Snap Store](https://snapcraft.io/static/images/badges/en/snap-store-black.svg)](https://snapcraft.io/osv-scanner)

> Notice: If you want to view the officially recommended method of installing of the tool, refer to the [OSV-Scanner documentation](https://google.github.io/osv-scanner/installation/).

As of December 2023, it supports lockfiles from C, C++, Dart, Elixir, Go, Java, JavaScript, PHP, Python, R, Ruby, and Rust. It also supports custom lockfiles: simply write some glue code to convert your lockfile into an intermediary JSON file with a particular format, and OSV-Scanner will comprehend the latter.

After confirming that a reported vulnerability is a false positive or discovering mitigations other than upgrading the package, OSV-Scanner provides the option to suppress it so that future runs will not display it.

# Local Build

1. Clone this repository: `git clone https://github.com/iosifache/osv-scanner-snap`
2. Move into the cloned repository: `cd osv-scanner-snap`
3. Install Snapcraft: `sudo snap install snapcraft --classic`
4. Build the snap: `snapcraft --verbose`
5. Install the snap: `snap install --dangerous ./osv-scanner_*.snap`
6. Test the snap by running the `osv-scanner` command: `osv-scanner`