-
Notifications
You must be signed in to change notification settings - Fork 515
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
scorecard started reducing score for vulnerabilities in unrelated packages that aren't imported #3891
Comments
Thanks for the issue. We use osv-scanner as a library for vulnerability detection. Luckily they support call analysis for Go, so we should be able to ignore these uncalled vulnerabilities. |
Remove OpenSSF Scorecard badge from README.md until this OpenSSF scorecard bug is fixed: ossf/scorecard#3891 The fix is in progress at OpenSSF Scorecard: ossf/scorecard#3893
My hope is to have #3893 merged soon. There was an upstream issue that needed to be fixed. Based on the currently implementation, the output when running on the above CBOR library would be: {
"details": [
"Warn: Project is vulnerable to: GO-2023-1840"
],
"score": 9,
"reason": "1 existing vulnerabilities detected",
"name": "Vulnerabilities",
"documentation": {
"url": "https://github.com/ossf/scorecard/blob/main/docs/checks.md#vulnerabilities",
"short": "Determines if the project has open, known unfixed vulnerabilities."
}
} Where GO-2023-1840 affects:
Since your Go directive specifies 1.17 as the minimum required Go version, #3893 would still penalize it. I realize this isn't a 100% fair/accurate outcome for a library, compared to an application, but Scorecard doesn't have any way of handling the distinction currently. |
@spencerschrock thanks for fast response and details! 😄 |
A slightly different fix was used, for now we are filtering all Go stdlib vulns, in part due to the issues I mentioned above the go directive being a minimum version, not the version a binary will eventually use. Note: this will still take some time (~10 days) for the change to propagate to the API/badge. |
Remove OpenSSF Scorecard badge from README.md until this OpenSSF scorecard bug is fixed: ossf/scorecard#3891 The fix is in progress at OpenSSF Scorecard: ossf/scorecard#3893
Describe the bug
Scorecard used to show 0 vulnerabilities but it suddenly started showing 29 vulnerabilities (e.g. in packages that are not imported directly or indirectly). This reduces the score by 10 points under "Vulnerabilities".
For example, a CBOR codec library isn't using any networking packages. However, scorecard is showing it as being affected by issues in
net/http
such as GO-2022-0969.GO-2022-0969 is a bug in
net/http
, which isn't directly or indirectly imported by the CBOR codec.Reproduction steps
Steps to reproduce the behavior:
net/http
)net/http
is not imported by fxamacker/cbor or fxamacker/cbor/v2Expected behavior
Report 0 vulnerabilities from
net/http
for projects that don't use or import anything that usesnet/http
.Additional context
Screenshot
I didn't investigate remaining vulnerabilities after seeing the first one is a false alarm.
The text was updated successfully, but these errors were encountered: