Skip to content

Releases: google/osv-scanner

v1.7.0

06 Mar 04:34
037c354
Compare
Choose a tag to compare

This version introduces our new guided remediation feature for npm! Try it with osv-scanner fix today!

Features

  • Feature #352 Guided Remediation
    Introducing our new experimental guided remediation feature on osv-scanner fix subcommand.
    See our docs for detailed usage instructions.

  • Feature #805
    Include CVSS MaxSevirity in JSON output.

Fixes

  • Bug #818
    Align GoVulncheck Go version with go.mod.

  • Bug #797
    Don't traverse gitignored dirs for gitignore files.

Miscellaneous

  • #831
    Remove version number from the release binary name.

New Contributors

Full Changelog: v1.6.2...v1.7.0

v1.6.2

31 Jan 04:13
5b4066c
Compare
Choose a tag to compare

Features

  • Feature #694 OSV-Scanner now has subcommands!
    The base command has been moved to scan (currently the only commands is scan). By default if you do not pass in a command, scan will be used, so CLI remains backwards compatible.

    This is a building block to adding the guided remediation feature. See issue #352 for more details!

  • Feature #776 Add pdm lockfile support.

API Features

  • Feature #754 Add dependency groups to flattened vulnerabilities output.

New Contributors

  • @jtt made their first contribution in #776

Full Changelog: v1.6.1...v1.6.2

v1.6.1

18 Jan 01:37
f6b0443
Compare
Choose a tag to compare

v1.6.0/v1.6.1:

Features

  • Feature #694 Add support for NuGet lock files version 2.

  • Feature #655 Scan and report dependency groups (e.g. "dev dependencies") for vulnerabilities.

  • Feature #702 Created an option to skip/disable upload to code scanning.

  • Feature #732 Add option to not fail on vulnerability being found for GitHub Actions.

  • Feature #729 Verify the spdx licenses passed in to the license allowlist.

Fixes

  • Bug #736 Show ecosystem and version even if git is shown if the info exists.

  • Bug #703 Return an error if both license scanning and local/offline scanning is enabled simultaneously.

  • Bug #718 Fixed parsing of SBOMs generated by the latest CycloneDX.

  • Bug #704 Get go stdlib version from go.mod.

API Features

  • Feature #727 Changes to Reporter methods to add verbosity levels and to deprecate functions.

New Contributors

Full Changelog: v1.5.0...v1.6.0-alpha3

v1.5.0

06 Dec 03:58
060799c
Compare
Choose a tag to compare

Changelog

Features

Fixes

  • Bug #639 We now filter local packages from scans, and report the filtering of those packages.
  • Bug #645 Properly handle file/url paths on Windows.
  • Bug #660 Remove noise from failed lockfile parsing.
  • Bug #649 No longer include vendored libraries in C/C++ package analysis.
  • Bug #634 Fix filtering of aliases to also include non OSV aliases

New Contributors

Full Changelog: v1.4.3...v1.5.0

v1.4.3

02 Nov 01:12
6316373
Compare
Choose a tag to compare

Features

Fixes

  • Bug #626
    Fix gitignore matching for root directory
  • Bug #622
    Go binary not found should not be an error
  • Bug #588
    handle npm/yarn aliased packages
  • Bug #607
    fix: remove some extra newlines in sarif report

New Contributors

Full Changelog: v1.4.2...v1.4.3

v1.4.2

25 Oct 04:18
1372552
Compare
Choose a tag to compare

v1.4.2:

Some minor fixes in this release.

Fixes

  • Bug #574
    Support versions with build metadata in yarn.lock files
  • Bug #599
    Add name field to sarif rule output

Full Changelog: v1.4.1...v1.4.2

v1.4.1

06 Oct 00:56
c509779
Compare
Choose a tag to compare

v1.4.1:

Features

API Features

  • Feature #557 Add new ecosystems, and a slice containing all of them.

v1.4.0

14 Sep 02:02
51fc4fd
Compare
Choose a tag to compare

v1.4.0:

Features

  • Feature #183 Add (experimental) offline mode! See our documentation for how to use it.
  • Feature #452 Add (experimental) rust call analysis, detect whether vulnerable functions are actually called in your Rust project! See our documentation for limitations and how to use this.
  • Feature #484 Detect the installed go version and checks for vulnerabilities in the standard library.
  • Feature #505 OSV-Scanner doesn't support your lockfile format? You can now use your own parser for your format, and create an intermediate osv-scanner.json for osv-scanner to scan. See our documentation for instructions.

API Features

  • Feature #451 The lockfile package now support extracting dependencies directly from any io.Reader, removing the requirement of a file path.

Fixes

  • Bug #457 Fix PURL mapping for Alpine packages
  • Bug #462 Use correct plural and singular forms based on count

New Contributors

Full Changelog: v1.3.6...v1.4.0

v1.3.6

19 Jul 05:47
b5f7502
Compare
Choose a tag to compare

Minor Updates

  • Feature #431
    Update GoVulnCheck integration.
  • Feature #439
    Create models.PURLToPackage(), and deprecate osvscanner.PURLToPackage().

Fixes

  • Feature #439
    Fix PURLToPackage not returning the full namespace of packages in ecosystems
    that use them (e.g. golang).

New Contributors

Full Changelog: v1.3.5...v1.3.6

v1.3.5

28 Jun 06:16
62df1c5
Compare
Choose a tag to compare

v1.3.5:

Features

  • Feature #409
    Adds an additional column to the table output which shows the severity if available.

API Features

  • Feature #424
  • Feature #417
  • Feature #417
    • Update the models package to better reflect the osv schema, including:
      • Add the withdrawn field
      • Improve timestamp serialization
      • Add related field
      • Add additional ecosystem constants
      • Add new reference types
      • Add YAML tags

New Contributors

Full Changelog: v1.3.4...v1.3.5