-
Notifications
You must be signed in to change notification settings - Fork 252
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
dotnet list packages
should not report false positives for assemblies in shared
directory
#13405
Comments
@richlander Issue is missing Type label, remember to add a Type label |
There's no assembly scanning, but rather package scanning here. A way to minimize this is #7344, and it's something we're planning to explore, but the degree to which it'd help that scenario is going to be dependent on what packages brought it in. |
@agocke -- you've been talking to vulnerability scanners. What is your guidance to them to avoid false positives like this? |
We need to come up with designs that work well for all vulnerability scanners. The .NET CLI should have the best implementation and it should be a good reference implementation for others. If the proposal does that, great. |
I think if we eliminate things at the root (restore time), all other commands and components benefit. (restore pruning them means list package gets them, means they probably don't end up in deps.json). I haven't look at this particular example, to know if a more minimal approach would solve it. |
That sounds good / makes sense. We now have a fair bit of experience with false positives. This should give us a sense of how likely it is for users to run into this scenario and how many of our packages can contribute to this problem. |
A user reported false positives vulnerability findings of .NET product CVEs using
dotnet list package --vulnerable --include-transitive
.dotnet/sdk#30659 (comment)
This behavior should be improved for .NET 8+ (8.0.1xx, 8.0.4xx, 9.0.1xx).
The text was updated successfully, but these errors were encountered: