-
Notifications
You must be signed in to change notification settings - Fork 29
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Trivy and Grype findings #41
Comments
Spam. |
Definitely not spam! I scanned it using Trivy, and it said all these things were a problem. If they are false positives, please let me know. |
Sorry @sblatnick - I didn't find how these apply to this code. Could you run the scan again and share with me the results after this latest release? Also, it would be great if the scans show the line numbers & code references that flagged these issues. |
Thanks! I'll try to dig up the details. |
These results came from scanning an image. All results are in a binary file, so giving the line number is not really possible. The file is ~/.local/share/gh/extensions/gh-token/gh-token Findings come from either Trivy or Grype scans. I am pretty busy today, so further details may have to wait until later this week. I hope this helps. |
Hmm.. I already have codeql running on the source & it has not flagged any issues 🤔 what this extension does is pretty straight forward so I'm not overly concerned. When you have information I can act on, I'll take a look and see what's reasonable to deal with. |
The following vulnerabilities have been detected in
/root/.local/share/gh/extensions/gh-token/gh-token
:The text was updated successfully, but these errors were encountered: