Documentation ¶
Index ¶
- func AnalyzeLibrary(ctx context.Context, path string, contents []byte, filemode os.FileMode, ...) (libraryScanners []models.LibraryScanner, err error)
- func DetectKBsFromKernelVersion(release, kernelVersion string) (models.WindowsKB, error)
- func EnsureResultDir(resultsDir string, scannedAt time.Time) (currentDir string, err error)
- func ParseInstalledPkgs(distro config.Distro, kernel models.Kernel, pkgList string) (models.Packages, models.SrcPackages, error)
- func ViaHTTP(header http.Header, body string, toLocalFile bool) (models.ScanResult, error)
- type DetectedCveID
- type DummyFileInfo
- type Scanner
Constants ¶
This section is empty.
Variables ¶
This section is empty.
Functions ¶
func AnalyzeLibrary ¶ added in v0.21.1
func AnalyzeLibrary(ctx context.Context, path string, contents []byte, filemode os.FileMode, isOffline bool) (libraryScanners []models.LibraryScanner, err error)
AnalyzeLibrary : detects library defined in artifact such as lockfile or jar
func DetectKBsFromKernelVersion ¶ added in v0.23.4
func EnsureResultDir ¶
EnsureResultDir ensures the directory for scan results
Types ¶
type DetectedCveID ¶
type DetectedCveID struct { CveID string Confidence models.Confidence }
DetectedCveID has CveID, Confidence and DetectionMethod fields LenientMatching will be true if this vulnerability is not detected by accurate version matching. see https://github.com/future-architect/vuls/pull/328
type DummyFileInfo ¶
type DummyFileInfo struct {
// contains filtered or unexported fields
}
DummyFileInfo is a dummy struct for libscan
type Scanner ¶
type Scanner struct { ResultsDir string TimeoutSec int ScanTimeoutSec int CacheDBPath string Debug bool LogToFile bool LogDir string Quiet bool DetectIPS bool Targets map[string]config.ServerInfo }
Scanner has functions for scan
func (Scanner) Configtest ¶
Configtest checks if the server is scannable.
Click to show internal directories.
Click to hide internal directories.