generated from codacy/codacy-public-template
-
Notifications
You must be signed in to change notification settings - Fork 1
feature: Malicious packages scanner [TAROT-3600] #175
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Merged
Merged
Changes from all commits
Commits
Show all changes
31 commits
Select commit
Hold shift + click to select a range
8ce1953
openssf malicious packages integration
kendrickcurtis 74218c6
updated test to match new live CVE
kendrickcurtis d314bc6
revised malicious package detection to prebuild an index nightly so a…
kendrickcurtis b01f785
fixed build - tool wasn't scanning for package.json -- added test for…
kendrickcurtis ba074fc
merged main, added Dockerfile
kendrickcurtis c7e814b
resolved codacy warnings
kendrickcurtis 4ee5970
fixed codacy cyclo issue
kendrickcurtis f84915d
fixed AI nonsense
kendrickcurtis e11d8a7
fixed CICD -- necessary file wasn't being copied
kendrickcurtis f41a50a
fixed another CICD issue
kendrickcurtis dfe1f8f
bugfix in tool.go to live with nil PURLs and fixed absent line number…
kendrickcurtis 45da0ab
stopped copying unnecessary files
kendrickcurtis d2d5356
fixed test data
kendrickcurtis a4efa1c
test fixes
kendrickcurtis 83b035a
ignored codacy config
kendrickcurtis 4082165
review comments tackled
kendrickcurtis 649f440
fixed stupid ai shit - npm ref in gradle file
kendrickcurtis 76cf210
fixed missing vuln
kendrickcurtis 1385e2b
Delete .codacy/cli.sh
kendrickcurtis 1234196
Delete .codacy/codacy.yaml
kendrickcurtis 438d8ef
clean: Assorted cleanup after rebase
afsmeira 0401b2a
clean: Improve build process for OpenSSF malicious packages index
afsmeira ef99b5d
clean: Simplify and correct malicious packages scanner implementation
afsmeira 76f19a4
clean: Ensure proper dependency injection for testable code
afsmeira d6f2a33
clean: Address codacy comments
afsmeira d6fb292
tests: Add unit tests and fix faulty implementations
afsmeira df03b28
ci: Serialize steps to avoid problems when saving to workspace
afsmeira b96b28d
tests: Fix integration tests
afsmeira dd6bd7c
clean: Log when failing to open file when building index
afsmeira 852dd65
clean: Address AI review comments
afsmeira 194cdf1
feat: Support the `last_affected` field in range events
afsmeira File filter
Filter by extension
Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
There are no files selected for viewing
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| Original file line number | Diff line number | Diff line change |
|---|---|---|
| @@ -0,0 +1,2 @@ | ||
| ## Malicious packages detection | ||
| Detects malicious packages identified in the OpenSSF Malicious Packages database, including typosquatting attacks, dependency confusion, and packages with malicious payloads. | ||
afsmeira marked this conversation as resolved.
Show resolved
Hide resolved
|
||
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| Original file line number | Diff line number | Diff line change |
|---|---|---|
|
|
@@ -40,4 +40,12 @@ | |
| severity="warning" | ||
| /> | ||
| </file> | ||
| </checkstyle> | ||
| <file name="javascript/package-lock.json"> | ||
| <error | ||
| source="malicious_packages" | ||
| line="11" | ||
| message="Malicious code in sdge-it-tdg-dynamicloadprofiles (npm) - [email protected]" | ||
| severity="error" | ||
| /> | ||
| </file> | ||
| </checkstyle> | ||
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| Original file line number | Diff line number | Diff line change |
|---|---|---|
| @@ -1,4 +1,5 @@ | ||
| org.apache.logging.log4j:log4j-core:2.17.0 | ||
| org.apache.dolphinscheduler:dolphinscheduler-task-api:3.2.1 | ||
| org.apache.seatunnel:seatunnel:1.0.0 | ||
| org.apache.cxf:cxf-rt-transports-http:4.0.0 | ||
| org.apache.cxf:cxf-rt-transports-http:4.0.0 | ||
| npm:commitlint-pm2-proxima-dotenv-safe:1.0.0 |
22 changes: 22 additions & 0 deletions
22
docs/multiple-tests/all-patterns/src/javascript/package-lock.json
Some generated files are not rendered by default. Learn more about how customized files appear on GitHub.
Oops, something went wrong.
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| Original file line number | Diff line number | Diff line change |
|---|---|---|
| @@ -0,0 +1,4 @@ | ||
| <?xml version="1.0" encoding="UTF-8"?> | ||
| <module name="root"> | ||
| <module name="malicious_packages" /> | ||
| </module> | ||
afsmeira marked this conversation as resolved.
Show resolved
Hide resolved
|
||
11 changes: 11 additions & 0 deletions
11
docs/multiple-tests/pattern-malicious-packages/results.xml
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| Original file line number | Diff line number | Diff line change |
|---|---|---|
| @@ -0,0 +1,11 @@ | ||
| <?xml version="1.0" encoding="utf-8"?> | ||
| <checkstyle version="1.5"> | ||
| <file name="javascript/package-lock.json"> | ||
| <error | ||
| source="malicious_packages" | ||
| line="11" | ||
| message="Malicious code in sdge-it-tdg-dynamicloadprofiles (npm) - [email protected]" | ||
| severity="error" | ||
| /> | ||
| </file> | ||
| </checkstyle> |
22 changes: 22 additions & 0 deletions
22
docs/multiple-tests/pattern-malicious-packages/src/javascript/package-lock.json
Some generated files are not rendered by default. Learn more about how customized files appear on GitHub.
Oops, something went wrong.
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| Original file line number | Diff line number | Diff line change |
|---|---|---|
|
|
@@ -2,3 +2,4 @@ | |
| <module name="root"> | ||
| <module name="vulnerability_critical" /> | ||
| </module> | ||
|
|
||
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| Original file line number | Diff line number | Diff line change |
|---|---|---|
|
|
@@ -94,12 +94,6 @@ | |
| message="Insecure dependency golang/[email protected] (CVE-2025-58187: Due to the design of the name constraint checking algorithm, the proce ...) (update to 1.24.9)" | ||
| severity="high" | ||
| /> | ||
| <error | ||
| source="vulnerability_high" | ||
| line="5" | ||
| message="Insecure dependency golang/[email protected] (CVE-2025-58188: Validating certificate chains which contain DSA public keys can cause ...) (update to 1.24.8)" | ||
| severity="high" | ||
| /> | ||
| <error | ||
| source="vulnerability_high" | ||
| line="5" | ||
|
|
||
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| Original file line number | Diff line number | Diff line change |
|---|---|---|
|
|
@@ -164,6 +164,12 @@ | |
| message="Insecure dependency golang/[email protected] (CVE-2025-61724: net/textproto: Excessive CPU consumption in Reader.ReadResponse in net/textproto) (update to 1.24.8)" | ||
| severity="warning" | ||
| /> | ||
| <error | ||
| source="vulnerability_medium" | ||
| line="3" | ||
| message="Insecure dependency golang/[email protected] (CVE-2025-58188: crypto/x509: golang: Panic when validating certificates with DSA public keys in crypto/x509) (update to 1.24.8)" | ||
| severity="warning" | ||
| /> | ||
| </file> | ||
|
|
||
| <file name="gradle/gradle.lockfile"> | ||
|
|
||
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| Original file line number | Diff line number | Diff line change |
|---|---|---|
| @@ -1,2 +1,2 @@ | ||
| // The tool package has the implementation of `codacy-trivy`. | ||
| // Package tool implements the Codacy Trivy tool. | ||
| package tool |
Oops, something went wrong.
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
Uh oh!
There was an error while loading. Please reload this page.