这是indexloc提供的服务,不要输入任何密码
Skip to content

Conversation

@dorpvom
Copy link
Member

@dorpvom dorpvom commented Mar 16, 2018

Detect known vulnerabilities based on

  • hash values
  • software versions
  • yara rules

@dorpvom dorpvom self-assigned this Mar 16, 2018
@dorpvom dorpvom requested a review from weidenba March 16, 2018 13:39
@codecov-io
Copy link

codecov-io commented Mar 19, 2018

Codecov Report

Merging #83 into master will increase coverage by 0.09%.
The diff coverage is 98.54%.

Impacted file tree graph

@@            Coverage Diff             @@
##           master      #83      +/-   ##
==========================================
+ Coverage   93.85%   93.95%   +0.09%     
==========================================
  Files         279      284       +5     
  Lines       13348    13620     +272     
==========================================
+ Hits        12528    12796     +268     
- Misses        820      824       +4
Impacted Files Coverage Δ
src/web_interface/components/statistic_routes.py 100% <ø> (ø) ⬆️
...nown_vulnerabilities/code/known_vulnerabilities.py 100% <100%> (ø)
src/test/integration/statistic/test_update.py 100% <100%> (ø) ⬆️
...known_vulnerabilities/test/test_vulnerabilities.py 100% <100%> (ø)
...alysis/known_vulnerabilities/test/test_rulebook.py 100% <100%> (ø)
src/web_interface/filter.py 87.62% <100%> (+0.53%) ⬆️
src/test/unit/web_interface/test_filter.py 100% <100%> (ø) ⬆️
src/web_interface/components/jinja_filter.py 87.36% <100%> (+0.13%) ⬆️
...vulnerabilities/test/test_known_vulnerabilities.py 100% <100%> (ø)
src/statistic/update.py 98.23% <100%> (+0.03%) ⬆️
... and 6 more

Continue to review full report at Codecov.

Legend - Click here to learn more
Δ = absolute <relative> (impact), ø = not affected, ? = missing data
Powered by Codecov. Last update ffec523...2664b11. Read the comment docs.

Copy link
Contributor

@weidenba weidenba left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

It should be possible to a add a link to more informations regarding the bug. E.g. a link to the CVE entry.

return new_results, summary

def _check_software_components(self, software_components_result):
found_vulnerabilities = list()
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

4 levels of indent is quite a lot. Consider refactoring.

@weidenba weidenba merged commit 4b441db into master Mar 28, 2018
@weidenba weidenba deleted the known-vulnerability-plugin branch March 28, 2018 11:16
weidenba added a commit that referenced this pull request Oct 22, 2018
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Projects

None yet

Development

Successfully merging this pull request may close these issues.

4 participants