owasp-depscan 4.2.8__py3-none-any.whl → 4.3.0__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- depscan/cli.py +81 -21
- depscan/lib/bom.py +1 -1
- depscan/lib/csaf.py +1680 -0
- {owasp_depscan-4.2.8.dist-info → owasp_depscan-4.3.0.dist-info}/METADATA +30 -8
- {owasp_depscan-4.2.8.dist-info → owasp_depscan-4.3.0.dist-info}/RECORD +9 -8
- {owasp_depscan-4.2.8.dist-info → owasp_depscan-4.3.0.dist-info}/LICENSE +0 -0
- {owasp_depscan-4.2.8.dist-info → owasp_depscan-4.3.0.dist-info}/WHEEL +0 -0
- {owasp_depscan-4.2.8.dist-info → owasp_depscan-4.3.0.dist-info}/entry_points.txt +0 -0
- {owasp_depscan-4.2.8.dist-info → owasp_depscan-4.3.0.dist-info}/top_level.txt +0 -0
|
@@ -1,6 +1,6 @@
|
|
|
1
1
|
Metadata-Version: 2.1
|
|
2
2
|
Name: owasp-depscan
|
|
3
|
-
Version: 4.
|
|
3
|
+
Version: 4.3.0
|
|
4
4
|
Summary: Fully open-source security audit for project dependencies based on known vulnerabilities and advisories.
|
|
5
5
|
Author-email: Team AppThreat <cloud@appthreat.com>
|
|
6
6
|
License: MIT
|
|
@@ -14,17 +14,19 @@ Classifier: Programming Language :: Python :: 3.8
|
|
|
14
14
|
Classifier: Programming Language :: Python :: 3.9
|
|
15
15
|
Classifier: Programming Language :: Python :: 3.10
|
|
16
16
|
Classifier: Programming Language :: Python :: 3.11
|
|
17
|
+
Classifier: Programming Language :: Python :: 3.12
|
|
17
18
|
Classifier: Topic :: Security
|
|
18
19
|
Classifier: Topic :: Utilities
|
|
19
20
|
Requires-Python: >=3.8
|
|
20
21
|
Description-Content-Type: text/markdown
|
|
21
22
|
License-File: LICENSE
|
|
22
|
-
Requires-Dist: appthreat-vulnerability-db >=5.
|
|
23
|
+
Requires-Dist: appthreat-vulnerability-db >=5.5.1
|
|
23
24
|
Requires-Dist: defusedxml
|
|
24
25
|
Requires-Dist: oras
|
|
25
26
|
Requires-Dist: PyYAML
|
|
26
27
|
Requires-Dist: rich
|
|
27
28
|
Requires-Dist: quart
|
|
29
|
+
Requires-Dist: toml
|
|
28
30
|
Provides-Extra: dev
|
|
29
31
|
Requires-Dist: black ; extra == 'dev'
|
|
30
32
|
Requires-Dist: flake8 ; extra == 'dev'
|
|
@@ -45,6 +47,7 @@ OWASP dep-scan is a fully open-source security audit tool based on known vulnera
|
|
|
45
47
|
- Scan most application code - local repos, Linux container images, Kubernetes manifests, and OS - to identify known CVEs with prioritization
|
|
46
48
|
- Package vulnerability scanning is performed locally and is quite fast. No server is used!
|
|
47
49
|
- Generate Software Bill-of-Materials (SBoM) with Vulnerability Exploitability Exchange (VEX) information
|
|
50
|
+
- Generate a Common Security Advisory Framework (CSAF) 2.0 document (check out the [CSAF Readme](contrib/CSAF_README.md))
|
|
48
51
|
- Perform deep packages risk audit for dependency confusion attacks and maintenance risks (See risk audit)
|
|
49
52
|
|
|
50
53
|

|
|
@@ -171,24 +174,33 @@ depscan --src $PWD --reports-dir $PWD/reports
|
|
|
171
174
|
Full list of options are below:
|
|
172
175
|
|
|
173
176
|
```bash
|
|
174
|
-
usage: depscan [-h] [--no-banner] [--cache] [--sync] [--suggest] [--risk-audit] [--private-ns PRIVATE_NS] [-t PROJECT_TYPE] [--bom BOM] -i
|
|
175
|
-
|
|
177
|
+
usage: depscan [-h] [--no-banner] [--cache] [--csaf] [--sync] [--suggest] [--risk-audit] [--private-ns PRIVATE_NS] [-t PROJECT_TYPE] [--bom BOM] [-i SRC_DIR_IMAGE] [-o REPORT_FILE] [--reports-dir REPORTS_DIR] [--no-error]
|
|
178
|
+
[--no-license-scan] [--deep] [--no-universal] [--no-vuln-table] [--threatdb-server THREATDB_SERVER] [--threatdb-username THREATDB_USERNAME] [--threatdb-password THREATDB_PASSWORD] [--threatdb-token THREATDB_TOKEN]
|
|
179
|
+
[--privado-json PRIVADO_JSON] [--server] [--server-host SERVER_HOST] [--server-port SERVER_PORT] [--cdxgen-server CDXGEN_SERVER] [-v]
|
|
180
|
+
|
|
181
|
+
Fully open-source security and license audit for application dependencies and container images based on known vulnerabilities and advisories.
|
|
182
|
+
|
|
183
|
+
options:
|
|
176
184
|
-h, --help show this help message and exit
|
|
177
185
|
--no-banner Do not display banner
|
|
178
186
|
--cache Cache vulnerability information in platform specific user_data_dir
|
|
187
|
+
--csaf Generate a CSAF
|
|
179
188
|
--sync Sync to receive the latest vulnerability data. Should have invoked cache first.
|
|
189
|
+
--suggest DEPRECATED: Suggest is the default mode for determining fix version.
|
|
180
190
|
--risk-audit Perform package risk audit (slow operation). Npm only.
|
|
181
191
|
--private-ns PRIVATE_NS
|
|
182
|
-
Private namespace to use while performing oss risk audit. Private packages should not be available in public registries by default. Comma
|
|
183
|
-
separated values accepted.
|
|
192
|
+
Private namespace to use while performing oss risk audit. Private packages should not be available in public registries by default. Comma separated values accepted.
|
|
184
193
|
-t PROJECT_TYPE, --type PROJECT_TYPE
|
|
185
194
|
Override project type if auto-detection is incorrect
|
|
186
195
|
--bom BOM Examine using the given Software Bill-of-Materials (SBoM) file in CycloneDX format. Use cdxgen command to produce one.
|
|
187
|
-
-i
|
|
188
|
-
Source directory
|
|
196
|
+
-i SRC_DIR_IMAGE, --src SRC_DIR_IMAGE
|
|
197
|
+
Source directory or container image or binary file
|
|
198
|
+
-o REPORT_FILE, --report_file REPORT_FILE
|
|
199
|
+
DEPRECATED. Use reports directory since multiple files are created. Report filename with directory
|
|
189
200
|
--reports-dir REPORTS_DIR
|
|
190
201
|
Reports directory
|
|
191
202
|
--no-error Continue on error to prevent build from breaking
|
|
203
|
+
--no-license-scan DEPRECATED: dep-scan does not perform license scanning by default
|
|
192
204
|
--deep Perform deep scan by passing this --deep argument to cdxgen. Useful while scanning docker images and OS packages.
|
|
193
205
|
--no-universal Depscan would attempt to perform a single universal scan instead of individual scans per language type.
|
|
194
206
|
--no-vuln-table Do not print the table with the full list of vulnerabilities. This can help reduce console output.
|
|
@@ -200,6 +212,16 @@ usage: depscan [-h] [--no-banner] [--cache] [--sync] [--suggest] [--risk-audit]
|
|
|
200
212
|
ThreatDB password
|
|
201
213
|
--threatdb-token THREATDB_TOKEN
|
|
202
214
|
ThreatDB token for token based submission
|
|
215
|
+
--privado-json PRIVADO_JSON
|
|
216
|
+
Optional: Enrich the VEX report with information from privado.ai json report. cdxgen can process and include privado info automatically so this argument is usually not required.
|
|
217
|
+
--server Run depscan as a server
|
|
218
|
+
--server-host SERVER_HOST
|
|
219
|
+
depscan server host
|
|
220
|
+
--server-port SERVER_PORT
|
|
221
|
+
depscan server port
|
|
222
|
+
--cdxgen-server CDXGEN_SERVER
|
|
223
|
+
cdxgen server url. Eg: http://cdxgen:9090
|
|
224
|
+
-v, --version Display the version
|
|
203
225
|
```
|
|
204
226
|
|
|
205
227
|
### Scanning containers locally (Python version)
|
|
@@ -1,10 +1,11 @@
|
|
|
1
1
|
depscan/__init__.py,sha256=47DEQpj8HBSa-_TImW-5JCeuQeRkm5NMpJWZG3hSuFU,0
|
|
2
|
-
depscan/cli.py,sha256=
|
|
2
|
+
depscan/cli.py,sha256=G-vLKjBr4hb9T6YmG3lybhngKalq9MSZsf92AOmQURY,30514
|
|
3
3
|
depscan/lib/__init__.py,sha256=47DEQpj8HBSa-_TImW-5JCeuQeRkm5NMpJWZG3hSuFU,0
|
|
4
4
|
depscan/lib/analysis.py,sha256=TIK0TuyxOng7VbDdweTndyouwMHDoTo-JjjzxOTiCxk,42085
|
|
5
5
|
depscan/lib/audit.py,sha256=rUkrlioaACfKXb7rLhJoSH4F3btpWLQ6OoSFwV0H62w,1246
|
|
6
|
-
depscan/lib/bom.py,sha256=
|
|
6
|
+
depscan/lib/bom.py,sha256=_d_ITu2-aFGerqekIFlQiDhFxKdB5C83bFod7YFxldo,16247
|
|
7
7
|
depscan/lib/config.py,sha256=9tyjo6uNdlJWyNNVfYD5tEt1wWexEyImMmuO8bK9Yns,12562
|
|
8
|
+
depscan/lib/csaf.py,sha256=jG25NAjdCtn9GIKkJ25oh3rssjkut3VYxhCY_V9AXpE,80939
|
|
8
9
|
depscan/lib/license.py,sha256=y4-WZuD2MOunKaLd2EJGcSYP6s3Lp_dgssdzhcl9eEM,2332
|
|
9
10
|
depscan/lib/logger.py,sha256=PdGrJstLmvwpMnlYx1zZ12jxz4kmbGm5kTSRs_8UcK4,1529
|
|
10
11
|
depscan/lib/normalize.py,sha256=k8OlhSjzhGieqK1BLJNABRuz2wcwO4J8Ce8lYUsaxik,10008
|
|
@@ -61,9 +62,9 @@ vendor/choosealicense.com/_licenses/vim.txt,sha256=d5GQjXB328L8EBkhKgxcjk344D3K7
|
|
|
61
62
|
vendor/choosealicense.com/_licenses/wtfpl.txt,sha256=BxXeubkvQm32MDmlZsBcbzJzBpR5kWgw0JxSR9d7f3k,948
|
|
62
63
|
vendor/choosealicense.com/_licenses/zlib.txt,sha256=e6dfCeLhxD3NCnIkY4cVIagRaWdRvencjNhHZ1APvpc,1678
|
|
63
64
|
vendor/spdx/json/licenses.json,sha256=PU1SD-zBi-U4r1XIWJ9qU-KixVWsQ5TJePUejC79yzU,251610
|
|
64
|
-
owasp_depscan-4.
|
|
65
|
-
owasp_depscan-4.
|
|
66
|
-
owasp_depscan-4.
|
|
67
|
-
owasp_depscan-4.
|
|
68
|
-
owasp_depscan-4.
|
|
69
|
-
owasp_depscan-4.
|
|
65
|
+
owasp_depscan-4.3.0.dist-info/LICENSE,sha256=oQnCbnZtJ_NLDdOLc-rVY1D1N0RNWLHPpYXcc77xzSo,1073
|
|
66
|
+
owasp_depscan-4.3.0.dist-info/METADATA,sha256=ZFFyFzVx8LICSMSBDkfG1HyfzPGc-nhuALCnAIbhoZA,22703
|
|
67
|
+
owasp_depscan-4.3.0.dist-info/WHEEL,sha256=yQN5g4mg4AybRjkgi-9yy4iQEFibGQmlz78Pik5Or-A,92
|
|
68
|
+
owasp_depscan-4.3.0.dist-info/entry_points.txt,sha256=FxQKHFWZTfKU2eBxHPFRxwhSNexntYygYhquykS8zxA,69
|
|
69
|
+
owasp_depscan-4.3.0.dist-info/top_level.txt,sha256=qbHOZvNU2dXANv946hMdP2vOi0ESQB5t2ZY5ktKtXvQ,15
|
|
70
|
+
owasp_depscan-4.3.0.dist-info/RECORD,,
|
|
File without changes
|
|
File without changes
|
|
File without changes
|
|
File without changes
|