silinternational/vulnerability-scanner
Scan your repos for vulnerabilities (such as dependencies with published security advisories)
JavaScriptMIT
Issues
- 0
Add a way for it to find (and record) the PHP version used in Docker images not yet in the spreadsheet
#54 opened by forevermatt - 0
- 0
- 0
Warn about use of abandoned dependencies
#52 opened by forevermatt - 1
- 0
Enable configuring what (if any) severity of dev. dependency vulnerabilities to report
#44 opened by forevermatt - 0
Add automated code linter/formatter
#29 opened by forevermatt - 0
Improve CLI for scanning both GitHub and Bitbucket to use named CLI parameters
#33 opened by forevermatt - 0
Check OSV for vulnerabilities in the programming language itself (PHP, NodeJS, etc.)
#40 opened by forevermatt - 1
Add automated tests
#27 opened by forevermatt - 0
Use a static analysis tool or service
#28 opened by forevermatt - 0
If no composer.lock found, check for composer.json that requires vulnerable dependencies
#10 opened by forevermatt - 0
- 0
- 1
- 2
- 1
- 1
- 1
Extract contents of `try` to separate method or methods (in `getSecurityVulnerabilitiesFor___Repo()` functions)
#94 opened by forevermatt - 0
- 1
Abort the run if a rate-limit error is hit
#38 opened by forevermatt - 0
Add a way to exclude archived Bitbucket repos
#57 opened by forevermatt - 1
- 0
- 0
- 0
- 0
Exclude archived GitHub repos
#20 opened by forevermatt - 0
Include link a "more details" link about the vulnerability in the results/CSV
#14 opened by forevermatt