-
Notifications
You must be signed in to change notification settings - Fork 11
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
incorrect dependency details for rust projects #23
Comments
Hi @Phate6660 Thank you for reporting the issue. On checking Cargo.lock I can see the vulnerable version of rand mentioned here - https://github.com/Phate6660/rsPhate/blob/master/Cargo.lock#L1212 . Have to read up on Cargo lock files to find which version would get used if multiple entries are present. Will you be able to point in the right direction here? mpd and mime findings are false positive. Scan uses dep-scan which uses NVD as a data source. Both mpd and mime has the group with suffix What I can do is for rust projects try to use rust advisory-db as a datasource instead of NVD. The change should happen here - https://github.com/AppThreat/vulnerability-db/tree/master/vdb/lib . Will you be able to contribute a PR? Regarding upload action failures, the codeql upload step that is mentioned in the workflow is refusing to work without any SARIF files. I added some logic to create an empty sarif file here - https://github.com/ShiftLeftSecurity/sast-scan/blob/master/scan#L580 . Looks like it has be extended to cover languages such as rust for which scan doesn't have any sast tool available. To summarize, there is quite a bit of work involved to support rust properly at this stage. Will keep this issue open and update with the progress made. |
Package rofl is indeed pulling the old version of rand here - https://github.com/Phate6660/rsPhate/blob/master/Cargo.lock#L1427 |
I can see that build failures due to missing sarif files is resolved now with the latest commit. |
FYI, this is still failing due to the absence of reports for me: https://github.com/noclick-me/noclickd/pull/22/checks?check_run_id=1650729881 |
I can see what is going on. Fix coming shortly but might ask for your help to retest |
@llucax Can you rerun the github action workflow? |
Sorry for the late reply, I did and it worked (as in the action didn't fail with an error). Thanks for the super fast reply! On an unrelated note, I was trying this action thinking that it will report any found vulnerabilities in dependencies in GitHub's Security tab as the ones you receive with officially supported languages (like ruby), but I guess if the report that is uploaded to GitHub is empty, that won't happen? |
@llucax Glad it fixed the errors. Depscan results are currently not integrated with GitHub code scanning. I wish GitHub would partner with us in opening the dependency scan results tab instead of keeping it locked to dependabot alone. Some folks like anchore convert depscan findings to SARIF format to make it appear in code scanning. I'm not in favor of this workaround although this is kinda possible. The json reports produced by scan can be consumed to have any custom workflow. For eg: https://slscan.io/en/latest/integrations/github-actions/ here there is an upload artifact step to upload all reports. Some users have built custom scripts for notifications and uploading reports to s3 bucket and so on. Hope this helps! |
For example, here is the latest scan from my rsPhate repo:
The latest version of the
mpd
crate is0.0.12
, so I'm not exactly sure where5.9
is coming from.And it thinks that my
rand
version is less than0.4.2
, when it's actually0.7.3
.This is unrelated, but all scans fail do to being unable to upload the report:
The text was updated successfully, but these errors were encountered: