You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
The OSV.dev database contains CVEs published through Github advisories in the Git ecosystem. When trying to scan dependencies of a project in this ecosystem, the scanning fails with { "code": 3, "message": "Invalid ecosystem" }.
For completeness, using purl instead does not solve the problem because then the package is filtered out as a "local" package. Here is the mwe for that:
The OSV.dev database contains CVEs published through Github advisories in the Git ecosystem. When trying to scan dependencies of a project in this ecosystem, the scanning fails with
{ "code": 3, "message": "Invalid ecosystem" }
.Is this because of "GIT" not being a well-supported ecosystem by definition of the Open Source Vulnerability format? Is there a way to mitigate this?
Minimal working example
where
mwe.json
containsThis should result in the reporting of (at least) CVE-2024-34537.
For completeness, using
purl
instead does not solve the problem because then the package is filtered out as a "local" package. Here is the mwe for that:The text was updated successfully, but these errors were encountered: