Documentation
¶
Index ¶
- func AnalyzeLibrary(ctx context.Context, path string, contents []byte, filemode os.FileMode, ...) (libraryScanners []models.LibraryScanner, err error)
- func DetectKBsFromKernelVersion(release, kernelVersion string) (models.WindowsKB, error)
- func EnsureResultDir(resultsDir string, scannedAt time.Time) (currentDir string, err error)
- func ParseInstalledPkgs(distro config.Distro, kernel models.Kernel, pkgList string) (models.Packages, models.SrcPackages, error)
- func ViaHTTP(header http.Header, body string, toLocalFile bool) (models.ScanResult, error)
- type DetectedCveID
- type DummyFileInfo
- type Scanner
Constants ¶
This section is empty.
Variables ¶
This section is empty.
Functions ¶
func AnalyzeLibrary ¶ added in v0.21.1
func AnalyzeLibrary(ctx context.Context, path string, contents []byte, filemode os.FileMode, isOffline bool) (libraryScanners []models.LibraryScanner, err error)
AnalyzeLibrary : detects library defined in artifact such as lockfile or jar
func DetectKBsFromKernelVersion ¶ added in v0.23.4
func EnsureResultDir ¶
EnsureResultDir ensures the directory for scan results
Types ¶
type DetectedCveID ¶
type DetectedCveID struct {
CveID string
Confidence models.Confidence
}
DetectedCveID has CveID, Confidence and DetectionMethod fields LenientMatching will be true if this vulnerability is not detected by accurate version matching. see https://github.com/future-architect/vuls/pull/328
type DummyFileInfo ¶
type DummyFileInfo struct {
// contains filtered or unexported fields
}
DummyFileInfo is a dummy struct for libscan
type Scanner ¶
type Scanner struct {
ResultsDir string
TimeoutSec int
ScanTimeoutSec int
CacheDBPath string
Debug bool
LogToFile bool
LogDir string
Quiet bool
DetectIPS bool
Targets map[string]config.ServerInfo
}
Scanner has functions for scan
func (Scanner) Configtest ¶
Configtest checks if the server is scannable.
Click to show internal directories.
Click to hide internal directories.