-
Notifications
You must be signed in to change notification settings - Fork 63
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
internal/scan: change text based on scan level
This change modifies the text output of govulncheck depending on the scan level - specifically omitting assumptions about callstack information when govulncheck never ran callstack analysis. Change-Id: Id3ba3a1c97edb6140f0f00d58d9ae76737fc0ce1 Reviewed-on: https://go-review.googlesource.com/c/vuln/+/545638 Reviewed-by: Zvonimir Pavlinovic <[email protected]> LUCI-TryBot-Result: Go LUCI <[email protected]>
- Loading branch information
Maceo Thompson
committed
Dec 13, 2023
1 parent
7827b5d
commit 65a3641
Showing
3 changed files
with
26 additions
and
12 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -1,7 +1,7 @@ | ||
=== Informational === | ||
|
||
There is 1 vulnerability in modules that you require that is neither | ||
imported nor called. You may not need to take any action. | ||
There is 1 vulnerability in modules that you require. Use -scan=symbol | ||
with govulncheck for more fine grained vulnerability detection. | ||
See https://pkg.go.dev/golang.org/x/vuln/cmd/govulncheck for details. | ||
|
||
Vulnerability #1: GO-0000-0001 | ||
|
@@ -12,6 +12,5 @@ Vulnerability #1: GO-0000-0001 | |
Fixed in: golang.org/[email protected] | ||
Platforms: amd | ||
|
||
No vulnerabilities found. | ||
|
||
Share feedback at https://go.dev/s/govulncheck-feedback. |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -1,7 +1,8 @@ | ||
=== Informational === | ||
|
||
There are 2 vulnerabilities in modules that you require that are | ||
neither imported nor called. You may not need to take any action. | ||
There are 2 vulnerabilities in modules that you require. Use | ||
-scan=symbol with govulncheck for more fine grained vulnerability | ||
detection. | ||
See https://pkg.go.dev/golang.org/x/vuln/cmd/govulncheck for details. | ||
|
||
Vulnerability #1: GO-0000-0002 | ||
|
@@ -19,6 +20,5 @@ Vulnerability #2: GO-0000-0001 | |
Fixed in: golang.org/[email protected] | ||
Platforms: amd | ||
|
||
No vulnerabilities found. | ||
|
||
Share feedback at https://go.dev/s/govulncheck-feedback. |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters