Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/mprpic/cvelint
CLI tool to validate CVE v5 JSON records.
https://github.com/mprpic/cvelint
cve linter security
Last synced: about 6 hours ago
JSON representation
CLI tool to validate CVE v5 JSON records.
- Host: GitHub
- URL: https://github.com/mprpic/cvelint
- Owner: mprpic
- License: mit
- Created: 2023-08-29T11:19:58.000Z (about 1 year ago)
- Default Branch: main
- Last Pushed: 2024-07-19T18:36:53.000Z (4 months ago)
- Last Synced: 2024-07-19T23:54:41.569Z (4 months ago)
- Topics: cve, linter, security
- Language: Go
- Homepage:
- Size: 36.1 KB
- Stars: 5
- Watchers: 3
- Forks: 1
- Open Issues: 5
-
Metadata Files:
- Readme: README.md
- License: LICENSE
Awesome Lists containing this project
README
# cvelint
CVE records in the [v5 JSON schema](https://github.com/CVEProject/cve-schema/tree/master/schema/v5.0) may include errors that are neither enforceable by a schema, nor validated on the backend in CVE Services when a CVE record is created/updated.
This CLI tool aims to validate CVE records for such errors so they can be fixed, and changes to the CVE schema can be made based on these findings.## Installation
### Binary Releases
For Linux, macOS, or Windows, you can download a binary release [here](https://github.com/mprpic/cvelint/releases).
### Build from Source
```bash
$ git clone https://github.com/mprpic/cvelint; cd cvelint
$ make build
$ ./bin/cvelint -h
```## Usage
```bash
$ git clone https://github.com/CVEProject/cvelistV5 # Download all CVE v5 records
$ ./cvelint -select E005 -cna redhat ./cvelistV5/cves/2023/
Collected 13501 files; checked 222 files.CVE-2023-3618 (redhat) -- /home/user/cvelistV5/cves/2023/3xxx/CVE-2023-3618.json
E005 Incorrect CVSS v3 severity: "high"; should be "medium" (at "containers.cna.metrics.1.cvssV3_1")Found 1 error.
$ ./cvelint -show-rules # Display available validation rules
$ ./cvelint -h # Display help
```## GitHub Action
[cvelint-action](https://github.com/jgamblin/cvelint-action) runs daily and produces a CSV and JSON output of all errors in the current CVE v5 data set.