In December 2022, we launched the open supply OSV-Scanner device, and earlier this 12 months, we open sourced OSV-SCALIBR. OSV-Scanner and OSV-SCALIBR, along with OSV.dev are parts of an open platform for managing vulnerability metadata and enabling easy and correct matching and remediation of recognized vulnerabilities. Our aim is to simplify and streamline vulnerability administration for builders and safety groups alike.
At this time, we’re thrilled to announce the launch of OSV-Scanner V2.0.0, following the announcement of the beta model. This V2 launch builds upon the inspiration we laid with OSV-SCALIBR and provides vital new capabilities to OSV-Scanner, making it a complete vulnerability scanner and remediation device with broad help for codecs and ecosystems.Â
What’s new
Enhanced Dependency Extraction with OSV-SCALIBR
This launch represents the primary main integration of OSV-SCALIBR options into OSV-Scanner, which is now the official command-line code and container scanning device for the OSV-SCALIBR library. This integration additionally expanded our help for the sorts of dependencies we are able to extract from initiatives and containers:
Supply manifests and lockfiles:
Artifacts:
-
Node modules
-
Python wheels
-
Java uber jars
-
Go binaries
Layer and base image-aware container scanning
Beforehand, OSV-Scanner targeted on scanning of supply repositories and language bundle manifests and lockfiles. OSV-Scanner V2 provides help for complete, layer-aware scanning for Debian, Ubuntu, and Alpine container photographs. OSV-Scanner can now analyze container photographs to offer:
-
Layers the place a bundle was first launched
-
Layer historical past and instructions
-
Base photographs the picture is predicated on (leveraging a new experimental API supplied by deps.dev).
-
OS/Distro the container is working on
-
Filtering of vulnerabilities which might be unlikely to impression your container picture
This layer evaluation presently helps the next OSes and languages:
Distro Assist:
Language Artifacts Assist:
Interactive HTML output
Presenting vulnerability scan info in a transparent and actionable manner is troublesome, significantly within the context of container scanning. To deal with this, we constructed a brand new interactive native HTML output format. This offers extra interactivity and knowledge in comparison with terminal solely outputs, together with:
And moreover for container picture scanning:
Illustration of HTML output for container picture scanning
Guided remediation for Maven pom.xml
Final 12 months we launched a characteristic referred to as guided remediation for npm, which streamlines vulnerability administration by intelligently suggesting prioritized, focused upgrades and providing versatile methods. This finally maximizes safety enhancements whereas minimizing disruption. Now we have now expanded this characteristic to Java by way of help for Maven pom.xml.
With guided remediation help for Maven, you’ll be able to remediate vulnerabilities in each direct and transitive dependencies by way of direct model updates or overriding variations by way of dependency administration.
We’ve launched a couple of new issues for our Maven help:
-
A brand new remediation technique override.
-
Assist for studying and writing pom.xml recordsdata, together with writing modifications to native mother or father pom recordsdata. We leverage OSV-Scalibr for Maven transitive dependency extraction.
-
A non-public registry may be specified to fetch Maven metadata.
-
A brand new experimental subcommend to replace all of your dependencies in pom.xml to the newest model.
We additionally launched machine readable output for guided remediation that makes it simpler to combine guided remediation into your workflow.
What’s subsequent?
Now we have thrilling plans for the rest of the 12 months, together with:
-
Continued OSV-SCALIBR Convergence: We are going to proceed to converge OSV-Scanner and OSV-SCALIBR to carry OSV-SCALIBR’s performance to OSV-Scanner’s CLI interface.
-
Expanded Ecosystem Assist: We’ll develop the variety of ecosystems we help throughout all of the options presently in OSV-Scanner, together with extra languages for guided remediation, OS advisories for container scanning, and extra normal lockfile help for supply code scanning.
-
Full Filesystem Accountability for Containers: One other aim of osv-scanner is to provide the means to know and account for each single file in your container picture, together with sideloaded binaries downloaded from the web.
-
Reachability Evaluation: We’re engaged on integrating reachability evaluation to offer deeper insights into the potential impression of vulnerabilities.
-
VEX Assist: We’re planning so as to add help for Vulnerability Alternate (VEX) to facilitate higher communication and collaboration round vulnerability info.
Strive OSV-Scanner V2
You may strive V2.0.0 and contribute to its ongoing growth by trying out OSV-Scanner or the OSV-SCALIBR repository. We welcome your suggestions and contributions as we proceed to enhance the platform and make vulnerability administration simpler for everybody.
You probably have any questions or if you need to contribute, do not hesitate to succeed in out to us at [email protected], or submit a problem in our difficulty tracker.