Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Add Scopes to Scanned Manifest Files inventory #713

Open
felickz opened this issue Mar 15, 2024 · 0 comments
Open

Add Scopes to Scanned Manifest Files inventory #713

felickz opened this issue Mar 15, 2024 · 0 comments
Labels
enhancement New feature or request

Comments

@felickz
Copy link
Contributor

felickz commented Mar 15, 2024

When reporting out blocking vulnerable packages, it can be hard to know why a vulnerability might have been excluded from the policy. By default, we do not fail/alert on vulnerable dev dependencies but the dependency review UX in GitHub will show vulnerability information on those dependencies (both direct and transitive).

  • Suggestion: Add (runtime), (development), or (unknown) to the PR / Action Logs:

Scanned Manifest Files

.github/workflows/dependency-review.yml

actions/dependency-review-action@main (runtime)
actions/dependency-review-action@1.. (runtime)

docs/package-lock.json

json-logic-js@1.2.3 (runtime)
minimist@1.2.5 (development)
ansi-regex@4.1.0 (development)
lodash@4.17.20 (development)
tar@2.2.2 (development)
fstream@1.0.11 (development)
lodash.mergewith@4.6.1 (development)
tar@2.2.1 (development)
node-sass@4.14.1 (development)
request@2.88.2 (development)

Dependency Review GitHub - Files Changed rich view:

  • would be nice to see scope here as well :)
    Image
@febuiles febuiles added the enhancement New feature or request label Mar 15, 2024
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
enhancement New feature or request
Projects
None yet
Development

No branches or pull requests

2 participants