You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: docs/descriptors/python_bandit.md
+4-4Lines changed: 4 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -45,7 +45,7 @@ Bandit is essential for maintaining secure Python codebases and is widely used i
45
45
46
46
## bandit documentation
47
47
48
-
- Version in MegaLinter: **1.8.6**
48
+
- Version in MegaLinter: **1.9.1**
49
49
- Visit [Official Web Site](https://bandit.readthedocs.io/en/latest/){target=_blank}
50
50
- See [How to configure bandit rules](https://bandit.readthedocs.io/en/latest/config.html#){target=_blank}
51
51
- If custom `.bandit.yml` config file isn't found, [.bandit.yml](https://github.com/oxsecurity/megalinter/tree/main/TEMPLATES/.bandit.yml){target=_blank} will be used
@@ -302,12 +302,12 @@ The following tests were discovered and loaded:
Copy file name to clipboardExpand all lines: docs/descriptors/repository_gitleaks.md
+5-5Lines changed: 5 additions & 5 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -34,18 +34,18 @@ If MegaLinter with gitleaks runs against a PR on a platform not listed above, an
34
34
35
35
You can still choose to scan only PR commits in your CI/CD platform by setting the following MegaLinter environment variables:
36
36
37
-
-`PULL_REQUEST=true`\*
38
-
-`REPOSITORY_GITLEAKS_PR_COMMITS_SCAN: true`
39
-
-`REPOSITORY_GITLEAKS_PR_SOURCE_SHA` with last commit sha from your PR and `REPOSITORY_GITLEAKS_PR_TARGET_SHA` commit sha from your target branch (for example, `main` if you do PR to main branch)
37
+
-`PULL_REQUEST=true`\*
38
+
-`REPOSITORY_GITLEAKS_PR_COMMITS_SCAN: true`
39
+
-`REPOSITORY_GITLEAKS_PR_SOURCE_SHA` with last commit sha from your PR and `REPOSITORY_GITLEAKS_PR_TARGET_SHA` commit sha from your target branch (for example, `main` if you do PR to main branch)
Copy file name to clipboardExpand all lines: docs/descriptors/repository_grype.md
+2-1Lines changed: 2 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -30,7 +30,7 @@ description: How to use grype (configure, ignore files, ignore errors, help & ve
30
30
31
31
## grype documentation
32
32
33
-
- Version in MegaLinter: **0.103.0**
33
+
- Version in MegaLinter: **0.104.0**
34
34
- Visit [Official Web Site](https://github.com/anchore/grype#readme){target=_blank}
35
35
- See [How to configure grype rules](https://github.com/anchore/grype#configuration){target=_blank}
36
36
- If custom `.grype.yaml` config file isn't found, [.grype.yaml](https://github.com/oxsecurity/megalinter/tree/main/TEMPLATES/.grype.yaml){target=_blank} will be used
@@ -151,6 +151,7 @@ Flags:
151
151
--exclude stringArray exclude paths from being scanned using a glob expression
152
152
-f, --fail-on string set the return code to 1 if a vulnerability is found with a severity >= the given severity, options=[negligible low medium high critical]
153
153
--file string file to write the default report output to (default is STDOUT)
154
+
--from stringArray specify the source behavior to use (e.g. docker, registry, podman, oci-dir, ...)
154
155
-h, --help helpfor grype
155
156
--ignore-states string ignore matches for vulnerabilities with specified comma separated fix states, options=[fixed not-fixed unknown wont-fix]
156
157
--name string set the name of the target being analyzed
--base-path string base directory for scanning, no links will be followed above this directory, and all paths will be reported relative to this directory
153
153
-c, --config stringArray syft configuration file(s) to use
154
-
--enrich stringArray enable package data enrichment from local and online sources (options: all, golang, java, javascript)
154
+
--enrich stringArray enable package data enrichment from local and online sources (options: all, golang, java, javascript, python)
155
155
--exclude stringArray exclude paths from being scanned using a glob expression
156
156
--file string file to write the default report output to (default is STDOUT) (DEPRECATED: use: --output FORMAT=PATH)
157
157
--from stringArray specify the source behavior to use (e.g. docker, registry, oci-dir, ...)
@@ -179,7 +179,7 @@ Use "syft [command] --help" for more information about a command.
0 commit comments