-
Notifications
You must be signed in to change notification settings - Fork 192
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
horusec:fix - Errors reported in v2.8.0-beta.1 #1050
Merged
Merged
Conversation
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
8395602
to
7dc811a
Compare
e99aae0
to
42e7b6c
Compare
3ff9e69
to
ce470b6
Compare
matheusalcantarazup
suggested changes
Mar 29, 2022
9edd980
to
0349a13
Compare
0349a13
to
5d1e2f6
Compare
nathanmartinszup
approved these changes
Mar 30, 2022
matheusalcantarazup
suggested changes
Mar 31, 2022
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Please also remove the output.txt empty file.
internal/services/formatters/csharp/dotnet_cli/formatter_test.go
Outdated
Show resolved
Hide resolved
5d1e2f6
to
7cd6810
Compare
done :) |
e158d28
to
4bcf40e
Compare
a3734db
to
3d871d0
Compare
matheusalcantarazup
approved these changes
Apr 4, 2022
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I'm afraid about accepting this pr, but here we go.
In this commit I made some changes to the code to improve the identification and generation of vulnerabilities pointed out by Horusec. * Now when Horusec identifies that there are duplicate hashes in its analysis by the same tool, all vulnerability descriptions will be grouped by the `(x/x) separator * Possible vulnerability detected:` demonstrating the amount of vulnerabilities that hash generated. * The `Details` field will be the last to be shown in each problem reported by Horusec in order to improve the experience and identification. * Tools like `DotnetCLI, BundlerAudit, Trivy, Safety, Nancy` were pointing out multiple vulnerabilities with the same hash because they couldn't find the exact line that contains the vulnerability. So an improvement has been implemented where using the `file.GetDependencyInfo` method will be a better way to identify the vulnerability * The `Trivy` tool was reporting problems finding the exact line so we noticed that when running the analysis on infrastructure configuration files the tool returns the line that has the problem, so now it can be more assertive with this improvement. * The `BundlerAudit` tool was quite complex in identifying vulnerabilities and with complex treatments, so we made an improvement so that the tool's output is in json format, so we will have better control of the information shown. * Tool versions update * horuszup/horusec-generic updated to v1.2.0 * semgrep updated to v0.85.0 version * owasp-dependency-check updated to v6.5.3 * updated trivy to v0.24.4 version * horuszup/horusec-go updated to v1.3.0 * nancy updated to version v1.0.33 * gosec updated to v2.11.0 version * horuszup/horusec-python updated to v1.0.1 version * updated bandit to v1.7.4 version * horuszup/horusec-ruby updated to v1.2.0 * Ruby updated to v3.1-alpine version * The e2e tests broke due to the joining of the hashes so now they are more assertive and I made an improvement in the test of the `Gitleaks` tool because validating that the tool was not running was not a good practice. But to run e2e tests in the `../horusec-examples-vulnerabilities` directory there must be [our test repository](https://github.com/ZupIT/horusec-examples-vulnerabilities). Signed-off-by: Wilian Gabriel <wilian.silva@zup.com.br>
3d871d0
to
ba58229
Compare
wiliansilvazup
added a commit
that referenced
this pull request
Apr 6, 2022
In this commit I made some changes to the code to improve the identification and generation of vulnerabilities pointed out by Horusec. * Now when Horusec identifies that there are duplicate hashes in its analysis by the same tool, all vulnerability descriptions will be grouped by the `(x/x) separator * Possible vulnerability detected:` demonstrating the amount of vulnerabilities that hash generated. * The `Details` field will be the last to be shown in each problem reported by Horusec in order to improve the experience and identification. * Tools like `DotnetCLI, BundlerAudit, Trivy, Safety, Nancy` were pointing out multiple vulnerabilities with the same hash because they couldn't find the exact line that contains the vulnerability. So an improvement has been implemented where using the `file.GetDependencyInfo` method will be a better way to identify the vulnerability * The `Trivy` tool was reporting problems finding the exact line so we noticed that when running the analysis on infrastructure configuration files the tool returns the line that has the problem, so now it can be more assertive with this improvement. * The `BundlerAudit` tool was quite complex in identifying vulnerabilities and with complex treatments, so we made an improvement so that the tool's output is in json format, so we will have better control of the information shown. * Tool versions update * horuszup/horusec-generic updated to v1.2.0 * semgrep updated to v0.85.0 version * owasp-dependency-check updated to v6.5.3 * updated trivy to v0.24.4 version * horuszup/horusec-go updated to v1.3.0 * nancy updated to version v1.0.33 * gosec updated to v2.11.0 version * horuszup/horusec-python updated to v1.0.1 version * updated bandit to v1.7.4 version * horuszup/horusec-ruby updated to v1.2.0 * Ruby updated to v3.1-alpine version * The e2e tests broke due to the joining of the hashes so now they are more assertive and I made an improvement in the test of the `Gitleaks` tool because validating that the tool was not running was not a good practice. But to run e2e tests in the `../horusec-examples-vulnerabilities` directory there must be [our test repository](https://github.com/ZupIT/horusec-examples-vulnerabilities). Signed-off-by: Wilian Gabriel <wilian.silva@zup.com.br> (cherry picked from commit 4ff44db) Signed-off-by: Wilian Gabriel <wilian.silva@zup.com.br>
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
In this commit I made some changes to the code to improve the
identification and generation of vulnerabilities pointed out by Horusec.
analysis by the same tool, all vulnerability descriptions will be grouped
by the
(x/x) separator * Possible vulnerability detected:
demonstratingthe amount of vulnerabilities that hash generated.
Details
field will be the last to be shown in each problemreported by Horusec in order to improve the experience and identification.
DotnetCLI, BundlerAudit, Trivy, Safety, Nancy
were pointingout multiple vulnerabilities with the same hash because they couldn't find
the exact line that contains the vulnerability. So an improvement has been
implemented where using the
file.GetDependencyInfo
method will be abetter way to identify the vulnerability
Trivy
tool was reporting problems finding the exact line so wenoticed that when running the analysis on infrastructure configuration
files the tool returns the line that has the problem,
so now it can be more assertive with this improvement.
BundlerAudit
tool was quite complex in identifying vulnerabilitiesand with complex treatments, so we made an improvement so that the tool's
output is in json format,
so we will have better control of the information shown.
assertive and I made an improvement in the test of the
Gitleaks
toolbecause validating that the tool was not running was not a good practice.
But to run e2e tests in the
../horusec-examples-vulnerabilities
directorythere must be our test repository.
Signed-off-by: Wilian Gabriel wilian.silva@zup.com.br