Google inoburitsa OSV-Scanner, inotsamira-inoziva vulnerability scanner

Google yakaunza iyo OSV-Scanner Toolkit yekutarisa kusarongeka kusiri mukodhi uye maapplication, tichifunga nezveketani yese yekutsamira yakabatana nekodhi. OSV-Scanner inobvumidza iwe kuona mamiriro apo application inova panjodzi nekuda kwematambudziko mune imwe yeraibhurari anoshandiswa seanotsamira. Muchiitiko ichi, raibhurari inotambura inogona kushandiswa zvisina kunanga, i.e. kudaidzwa neimwe nzira. Iyo kodhi yeprojekiti yakanyorwa muGo uye yakagoverwa pasi peiyo Apache 2.0 rezinesi.

OSV-Scanner inogona otomatiki kuongorora dhairekitori yemuti, kuona mapurojekiti uye mashandisirwo nekuvapo kwegit madhairekitori (ruzivo nezve kusasimba kunotemerwa kuburikidza nekuongororwa kwekuita hashes), mafaera eSBOM (Software Bill Yezvinhu muSPDX uye CycloneDX mafomati), inoratidza kana kiya mafaera epasuru mamaneja akadai seYarn, NPM, GEM, PIP uye Cargo. Inotsigirawo kuongorora zviri mukati meDocker mudziyo mifananidzo yakavakwa kubva mapakeji kubva kuDebian repositories.

Google inoburitsa OSV-Scanner, inotsamira-inoziva vulnerability scanner

Ruzivo rwekusagadzikana rwakatorwa kubva kuOSV (Open Source Vulnerabilities) dhatabhesi, iyo inovhara ruzivo nezvematambudziko ekuchengetedza muCrates.io (Rust), Go, Maven, NPM (JavaScript), NuGet (C#), Packagist (PHP), PyPI. (Python), RubyGems, Android, Debian neAlpine, pamwe chete nedata rekusagadzikana muLinux kernel uye ruzivo kubva kunjodzi mishumo mumapurojekiti akabatwa paGitHub. Dhatabhesi reOSV rinoratidza mamiriro ekugadzirisa dambudziko, rinoratidza kuzvipira nechitarisiko uye kugadzirisa kwekusagadzikana, huwandu hweshanduro dzakakanganiswa nekusagadzikana, zvinongedzo kune purojekiti repository nekodhi, uye chiziviso nezve dambudziko. Iyo API yakapihwa inobvumidza iwe kuti utarise kuratidzwa kwekusagadzikana padanho rekuita uye ma tag uye kuongorora kusanzwisisika kwezvinobvamo zvigadzirwa uye kutsamira kune dambudziko.

Google inoburitsa OSV-Scanner, inotsamira-inoziva vulnerability scanner


Source: opennet.ru

Voeg