In December 2022, we launched the open supply OSV-Scanner instrument, and earlier this yr, we open sourced OSV-SCALIBR. OSV-Scanner and OSV-SCALIBR, along with OSV.dev are elements of an open platform for managing vulnerability metadata and enabling easy and correct matching and remediation of recognized vulnerabilities. Our purpose is to simplify and streamline vulnerability administration for builders and safety groups alike.
As we speak, we’re thrilled to announce the launch of OSV-Scanner V2.0.0, following the announcement of the beta model. This V2 launch builds upon the muse we laid with OSV-SCALIBR and provides vital new capabilities to OSV-Scanner, making it a complete vulnerability scanner and remediation instrument with broad help for codecs and ecosystems.Â
What’s new
Enhanced Dependency Extraction with OSV-SCALIBR
This launch represents the primary main integration of OSV-SCALIBR options into OSV-Scanner, which is now the official command-line code and container scanning instrument for the OSV-SCALIBR library. This integration additionally expanded our help for the sorts of dependencies we will extract from initiatives and containers:
Supply manifests and lockfiles:
Artifacts:
-
Node modules
-
Python wheels
-
Java uber jars
-
Go binaries
Layer and base image-aware container scanning
Beforehand, OSV-Scanner targeted on scanning of supply repositories and language package deal manifests and lockfiles. OSV-Scanner V2 provides help for complete, layer-aware scanning for Debian, Ubuntu, and Alpine container photos. OSV-Scanner can now analyze container photos to offer:
-
Layers the place a package deal was first launched
-
Layer historical past and instructions
-
Base photos the picture is predicated on (leveraging a new experimental API supplied by deps.dev).
-
OS/Distro the container is operating on
-
Filtering of vulnerabilities which might be unlikely to impression your container picture
This layer evaluation at present helps the next OSes and languages:
Distro Help:
Language Artifacts Help:
Interactive HTML output
Presenting vulnerability scan data in a transparent and actionable means is troublesome, notably within the context of container scanning. To handle this, we constructed a brand new interactive native HTML output format. This gives extra interactivity and knowledge in comparison with terminal solely outputs, together with:
And moreover for container picture scanning:
Illustration of HTML output for container picture scanning
Guided remediation for Maven pom.xml
Final yr we launched a characteristic referred to as guided remediation for npm, which streamlines vulnerability administration by intelligently suggesting prioritized, focused upgrades and providing versatile methods. This in the end maximizes safety enhancements whereas minimizing disruption. We have now now expanded this characteristic to Java by means of help for Maven pom.xml.
With guided remediation help for Maven, you possibly can remediate vulnerabilities in each direct and transitive dependencies by means of direct model updates or overriding variations by means of dependency administration.
We’ve launched just a few new issues for our Maven help:
-
A brand new remediation technique override.
-
Help for studying and writing pom.xml recordsdata, together with writing adjustments to native dad or mum pom recordsdata. We leverage OSV-Scalibr for Maven transitive dependency extraction.
-
A non-public registry may be specified to fetch Maven metadata.
-
A brand new experimental subcommend to replace all of your dependencies in pom.xml to the newest model.
We additionally launched machine readable output for guided remediation that makes it simpler to combine guided remediation into your workflow.
What’s subsequent?
We have now thrilling plans for the rest of the yr, together with:
-
Continued OSV-SCALIBR Convergence: We are going to proceed to converge OSV-Scanner and OSV-SCALIBR to carry OSV-SCALIBR’s performance to OSV-Scanner’s CLI interface.
-
Expanded Ecosystem Help: We’ll increase the variety of ecosystems we help throughout all of the options at present in OSV-Scanner, together with extra languages for guided remediation, OS advisories for container scanning, and extra basic lockfile help for supply code scanning.
-
Full Filesystem Accountability for Containers: One other purpose of osv-scanner is to provide the capability to know and account for each single file in your container picture, together with sideloaded binaries downloaded from the web.
-
Reachability Evaluation: We’re engaged on integrating reachability evaluation to offer deeper insights into the potential impression of vulnerabilities.
-
VEX Help: We’re planning so as to add help for Vulnerability Trade (VEX) to facilitate higher communication and collaboration round vulnerability data.
Attempt OSV-Scanner V2
You may strive V2.0.0 and contribute to its ongoing growth by trying out OSV-Scanner or the OSV-SCALIBR repository. We welcome your suggestions and contributions as we proceed to enhance the platform and make vulnerability administration simpler for everybody.
When you’ve got any questions or if you want to contribute, do not hesitate to succeed in out to us at osv-discuss@google.com, or submit a problem in our difficulty tracker.