Integrate OWASP Dependency Check
This commit is contained in:
26
README.md
26
README.md
@@ -866,7 +866,7 @@ optional = [
|
||||
|
||||
----
|
||||
|
||||
# Usage: Scan vulnerability of non-OS package
|
||||
# Usage: Scan vulnerabilites of non-OS packages
|
||||
|
||||
It is possible to detect vulnerabilities in non-OS packages, such as something you compiled by yourself, language libraries and frameworks, that have been registered in the [CPE](https://nvd.nist.gov/cpe.cfm).
|
||||
|
||||
@@ -890,6 +890,30 @@ To detect the vulnerability of Ruby on Rails v4.2.1, cpeNames needs to be set in
|
||||
"cpe:/a:rubyonrails:ruby_on_rails:4.2.1",
|
||||
]
|
||||
```
|
||||
|
||||
# Usage: Integrate with OWASP Dependency Check to Automatic update when the libraries are updated (Experimental)
|
||||
[OWASP Dependency check](https://www.owasp.org/index.php/OWASP_Dependency_Check) is a utility that identifies project dependencies and checks if there are any known, publicly disclosed, vulnerabilities.
|
||||
|
||||
Benefit of integrating Vuls And OWASP Dependency Check is below.
|
||||
- Automatic Update of Vuls config when the libraries are updated.
|
||||
- Reporting by Email or Slack by using Vuls.
|
||||
- Reporting in Japanese
|
||||
- OWASP Dependency Check supports only English
|
||||
|
||||
How to integrate Vuls with OWASP Dependency Check
|
||||
- Execute OWASP Dependency Check with --format=XML option.
|
||||
- Define the xml file path of dependency check in config.toml.
|
||||
|
||||
```
|
||||
[servers]
|
||||
|
||||
[servers.172-31-4-82]
|
||||
host = "172.31.4.82"
|
||||
user = "ec2-user"
|
||||
keyPath = "/home/username/.ssh/id_rsa"
|
||||
dependencyCheckXMLPath = "/tmp/dependency-check-report.xml"
|
||||
```
|
||||
|
||||
|
||||
# Usage: Scan Docker containers
|
||||
|
||||
|
||||
Reference in New Issue
Block a user