owasp-depscan 4.2.8__py3-none-any.whl → 4.3.0__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
@@ -1,6 +1,6 @@
1
1
  Metadata-Version: 2.1
2
2
  Name: owasp-depscan
3
- Version: 4.2.8
3
+ Version: 4.3.0
4
4
  Summary: Fully open-source security audit for project dependencies based on known vulnerabilities and advisories.
5
5
  Author-email: Team AppThreat <cloud@appthreat.com>
6
6
  License: MIT
@@ -14,17 +14,19 @@ Classifier: Programming Language :: Python :: 3.8
14
14
  Classifier: Programming Language :: Python :: 3.9
15
15
  Classifier: Programming Language :: Python :: 3.10
16
16
  Classifier: Programming Language :: Python :: 3.11
17
+ Classifier: Programming Language :: Python :: 3.12
17
18
  Classifier: Topic :: Security
18
19
  Classifier: Topic :: Utilities
19
20
  Requires-Python: >=3.8
20
21
  Description-Content-Type: text/markdown
21
22
  License-File: LICENSE
22
- Requires-Dist: appthreat-vulnerability-db >=5.4.2
23
+ Requires-Dist: appthreat-vulnerability-db >=5.5.1
23
24
  Requires-Dist: defusedxml
24
25
  Requires-Dist: oras
25
26
  Requires-Dist: PyYAML
26
27
  Requires-Dist: rich
27
28
  Requires-Dist: quart
29
+ Requires-Dist: toml
28
30
  Provides-Extra: dev
29
31
  Requires-Dist: black ; extra == 'dev'
30
32
  Requires-Dist: flake8 ; extra == 'dev'
@@ -45,6 +47,7 @@ OWASP dep-scan is a fully open-source security audit tool based on known vulnera
45
47
  - Scan most application code - local repos, Linux container images, Kubernetes manifests, and OS - to identify known CVEs with prioritization
46
48
  - Package vulnerability scanning is performed locally and is quite fast. No server is used!
47
49
  - Generate Software Bill-of-Materials (SBoM) with Vulnerability Exploitability Exchange (VEX) information
50
+ - Generate a Common Security Advisory Framework (CSAF) 2.0 document (check out the [CSAF Readme](contrib/CSAF_README.md))
48
51
  - Perform deep packages risk audit for dependency confusion attacks and maintenance risks (See risk audit)
49
52
 
50
53
  ![Dependency Tree with Insights](docs/tree1.jpg)
@@ -171,24 +174,33 @@ depscan --src $PWD --reports-dir $PWD/reports
171
174
  Full list of options are below:
172
175
 
173
176
  ```bash
174
- usage: depscan [-h] [--no-banner] [--cache] [--sync] [--suggest] [--risk-audit] [--private-ns PRIVATE_NS] [-t PROJECT_TYPE] [--bom BOM] -i SRC_DIR
175
- [--reports-dir REPORTS_DIR] [--no-error] [--deep]
177
+ usage: depscan [-h] [--no-banner] [--cache] [--csaf] [--sync] [--suggest] [--risk-audit] [--private-ns PRIVATE_NS] [-t PROJECT_TYPE] [--bom BOM] [-i SRC_DIR_IMAGE] [-o REPORT_FILE] [--reports-dir REPORTS_DIR] [--no-error]
178
+ [--no-license-scan] [--deep] [--no-universal] [--no-vuln-table] [--threatdb-server THREATDB_SERVER] [--threatdb-username THREATDB_USERNAME] [--threatdb-password THREATDB_PASSWORD] [--threatdb-token THREATDB_TOKEN]
179
+ [--privado-json PRIVADO_JSON] [--server] [--server-host SERVER_HOST] [--server-port SERVER_PORT] [--cdxgen-server CDXGEN_SERVER] [-v]
180
+
181
+ Fully open-source security and license audit for application dependencies and container images based on known vulnerabilities and advisories.
182
+
183
+ options:
176
184
  -h, --help show this help message and exit
177
185
  --no-banner Do not display banner
178
186
  --cache Cache vulnerability information in platform specific user_data_dir
187
+ --csaf Generate a CSAF
179
188
  --sync Sync to receive the latest vulnerability data. Should have invoked cache first.
189
+ --suggest DEPRECATED: Suggest is the default mode for determining fix version.
180
190
  --risk-audit Perform package risk audit (slow operation). Npm only.
181
191
  --private-ns PRIVATE_NS
182
- Private namespace to use while performing oss risk audit. Private packages should not be available in public registries by default. Comma
183
- separated values accepted.
192
+ Private namespace to use while performing oss risk audit. Private packages should not be available in public registries by default. Comma separated values accepted.
184
193
  -t PROJECT_TYPE, --type PROJECT_TYPE
185
194
  Override project type if auto-detection is incorrect
186
195
  --bom BOM Examine using the given Software Bill-of-Materials (SBoM) file in CycloneDX format. Use cdxgen command to produce one.
187
- -i SRC_DIR, --src SRC_DIR
188
- Source directory
196
+ -i SRC_DIR_IMAGE, --src SRC_DIR_IMAGE
197
+ Source directory or container image or binary file
198
+ -o REPORT_FILE, --report_file REPORT_FILE
199
+ DEPRECATED. Use reports directory since multiple files are created. Report filename with directory
189
200
  --reports-dir REPORTS_DIR
190
201
  Reports directory
191
202
  --no-error Continue on error to prevent build from breaking
203
+ --no-license-scan DEPRECATED: dep-scan does not perform license scanning by default
192
204
  --deep Perform deep scan by passing this --deep argument to cdxgen. Useful while scanning docker images and OS packages.
193
205
  --no-universal Depscan would attempt to perform a single universal scan instead of individual scans per language type.
194
206
  --no-vuln-table Do not print the table with the full list of vulnerabilities. This can help reduce console output.
@@ -200,6 +212,16 @@ usage: depscan [-h] [--no-banner] [--cache] [--sync] [--suggest] [--risk-audit]
200
212
  ThreatDB password
201
213
  --threatdb-token THREATDB_TOKEN
202
214
  ThreatDB token for token based submission
215
+ --privado-json PRIVADO_JSON
216
+ Optional: Enrich the VEX report with information from privado.ai json report. cdxgen can process and include privado info automatically so this argument is usually not required.
217
+ --server Run depscan as a server
218
+ --server-host SERVER_HOST
219
+ depscan server host
220
+ --server-port SERVER_PORT
221
+ depscan server port
222
+ --cdxgen-server CDXGEN_SERVER
223
+ cdxgen server url. Eg: http://cdxgen:9090
224
+ -v, --version Display the version
203
225
  ```
204
226
 
205
227
  ### Scanning containers locally (Python version)
@@ -1,10 +1,11 @@
1
1
  depscan/__init__.py,sha256=47DEQpj8HBSa-_TImW-5JCeuQeRkm5NMpJWZG3hSuFU,0
2
- depscan/cli.py,sha256=YLWItzDxTTLGt_IF9lJd6_MN_bNrncrsrg-FuDpF9A4,28891
2
+ depscan/cli.py,sha256=G-vLKjBr4hb9T6YmG3lybhngKalq9MSZsf92AOmQURY,30514
3
3
  depscan/lib/__init__.py,sha256=47DEQpj8HBSa-_TImW-5JCeuQeRkm5NMpJWZG3hSuFU,0
4
4
  depscan/lib/analysis.py,sha256=TIK0TuyxOng7VbDdweTndyouwMHDoTo-JjjzxOTiCxk,42085
5
5
  depscan/lib/audit.py,sha256=rUkrlioaACfKXb7rLhJoSH4F3btpWLQ6OoSFwV0H62w,1246
6
- depscan/lib/bom.py,sha256=p3M42oneJYHHUzrkfFDjWSKaWRTIUJtoZhEEbs3yWsE,16210
6
+ depscan/lib/bom.py,sha256=_d_ITu2-aFGerqekIFlQiDhFxKdB5C83bFod7YFxldo,16247
7
7
  depscan/lib/config.py,sha256=9tyjo6uNdlJWyNNVfYD5tEt1wWexEyImMmuO8bK9Yns,12562
8
+ depscan/lib/csaf.py,sha256=jG25NAjdCtn9GIKkJ25oh3rssjkut3VYxhCY_V9AXpE,80939
8
9
  depscan/lib/license.py,sha256=y4-WZuD2MOunKaLd2EJGcSYP6s3Lp_dgssdzhcl9eEM,2332
9
10
  depscan/lib/logger.py,sha256=PdGrJstLmvwpMnlYx1zZ12jxz4kmbGm5kTSRs_8UcK4,1529
10
11
  depscan/lib/normalize.py,sha256=k8OlhSjzhGieqK1BLJNABRuz2wcwO4J8Ce8lYUsaxik,10008
@@ -61,9 +62,9 @@ vendor/choosealicense.com/_licenses/vim.txt,sha256=d5GQjXB328L8EBkhKgxcjk344D3K7
61
62
  vendor/choosealicense.com/_licenses/wtfpl.txt,sha256=BxXeubkvQm32MDmlZsBcbzJzBpR5kWgw0JxSR9d7f3k,948
62
63
  vendor/choosealicense.com/_licenses/zlib.txt,sha256=e6dfCeLhxD3NCnIkY4cVIagRaWdRvencjNhHZ1APvpc,1678
63
64
  vendor/spdx/json/licenses.json,sha256=PU1SD-zBi-U4r1XIWJ9qU-KixVWsQ5TJePUejC79yzU,251610
64
- owasp_depscan-4.2.8.dist-info/LICENSE,sha256=oQnCbnZtJ_NLDdOLc-rVY1D1N0RNWLHPpYXcc77xzSo,1073
65
- owasp_depscan-4.2.8.dist-info/METADATA,sha256=VGn9W5XTh5cIhRhNMM9O7oG82xR2Z8X5uyqRoralf8Q,20990
66
- owasp_depscan-4.2.8.dist-info/WHEEL,sha256=yQN5g4mg4AybRjkgi-9yy4iQEFibGQmlz78Pik5Or-A,92
67
- owasp_depscan-4.2.8.dist-info/entry_points.txt,sha256=FxQKHFWZTfKU2eBxHPFRxwhSNexntYygYhquykS8zxA,69
68
- owasp_depscan-4.2.8.dist-info/top_level.txt,sha256=qbHOZvNU2dXANv946hMdP2vOi0ESQB5t2ZY5ktKtXvQ,15
69
- owasp_depscan-4.2.8.dist-info/RECORD,,
65
+ owasp_depscan-4.3.0.dist-info/LICENSE,sha256=oQnCbnZtJ_NLDdOLc-rVY1D1N0RNWLHPpYXcc77xzSo,1073
66
+ owasp_depscan-4.3.0.dist-info/METADATA,sha256=ZFFyFzVx8LICSMSBDkfG1HyfzPGc-nhuALCnAIbhoZA,22703
67
+ owasp_depscan-4.3.0.dist-info/WHEEL,sha256=yQN5g4mg4AybRjkgi-9yy4iQEFibGQmlz78Pik5Or-A,92
68
+ owasp_depscan-4.3.0.dist-info/entry_points.txt,sha256=FxQKHFWZTfKU2eBxHPFRxwhSNexntYygYhquykS8zxA,69
69
+ owasp_depscan-4.3.0.dist-info/top_level.txt,sha256=qbHOZvNU2dXANv946hMdP2vOi0ESQB5t2ZY5ktKtXvQ,15
70
+ owasp_depscan-4.3.0.dist-info/RECORD,,