Skip to content
#

vulnerability-scanners

Here are 195 public repositories matching this topic...

Varbin
Varbin commented Feb 5, 2018

I'm using OpenNTPD instead of the default ntp on my FreeBSD server - when lynis analyses the ntp settings it tries to query information with ntpq which is (to my knowledge) is not possible with OpenNTPD.

Lynis will slow down as ntpq takes a while fail.

OS: FreeBSD 10.4
Lynis: 2.6.1 (768446e4)

[ Lynis 2.6.1 ]

####################################################################

This repository is primarily maintained by Omar Santos and includes thousands of resources related to ethical hacking / penetration testing, digital forensics and incident response (DFIR), vulnerability research, exploit development, reverse engineering, and more.

  • Updated Feb 24, 2020
  • Python
computeralex92
computeralex92 commented Dec 29, 2019

In a server / client setup it would be great if Trivy would expose some metrics about the scans happen with the central server.
Some useful metrics for my implementation:

  • Last DB Update (timestamp)
  • Last DB Update Attempt (timestamp)
  • Sum of Issues found
  • Sum of Issues found splited up in SEVERITY
  • Sum of Issues found splited up in sources (OS, Python, Node etc)

As Trivy is build to

charleswhchan
charleswhchan commented May 26, 2019
  • safety version: 1.8.5
  • Python version: 3.6.7
  • Operating System: Ubuntu 18.04

Description

safety skips package(s) with --hash inside requirements.txt

$ cat requirements.txt
flask==0.12.1 --hash=sha256:6c3130c8927109a08225993e4e503de4ac4f2678678ae211b33b519c622a7242

What I Did

$ safety check -r requirements.txt
│ REPORT                                 
cwcromwell
cwcromwell commented Jul 29, 2018

I did a basic line edit of the "Usage" section, but next it needs reorganization and more information.

Would anyone want to spend time on a call or two to help me understand some of the commands? Some of them aren't obvious to me from the command line help, so they might benefit from better explanation.

(I'll continue to work on this section, but having a technical expert to answer some of

strtdusty
strtdusty commented Sep 29, 2018

I believe that the process for scanning with clair-scanner is something like

  1. clair-scanner starts a local registry
  2. clair-scanner calls clair requesting a scan using the --IP parameter
  3. clair calls back to the public IP sent and pulls the image

I think this should really be called out in the readme as a major decision in determining if you should use the tool. I was evaluating this

Improve this page

Add a description, image, and links to the vulnerability-scanners topic page so that developers can more easily learn about it.

Curate this topic

Add this topic to your repo

To associate your repository with the vulnerability-scanners topic, visit your repo's landing page and select "manage topics."

Learn more

You can’t perform that action at this time.