mirror of
https://github.com/safedep/vet.git
synced 2025-12-10 00:22:08 -06:00
chore: correct typos (#460)
This commit is contained in:
parent
7f88f83a8c
commit
03e1a10c1d
@ -130,7 +130,7 @@ func (a *malwareAnalyzer) Finish() error {
|
||||
// The decision involves:
|
||||
//
|
||||
// - No action if the package is not classified as malware
|
||||
// - Malware if a verfication record is available to confirm
|
||||
// - Malware if a verification record is available to confirm
|
||||
// - Malware if `TrustAutomatedAnalysis` config is enabled and confidence is high
|
||||
// - Suspicious for all other cases
|
||||
func (a *malwareAnalyzer) applyMalwareDecision(pkg *models.Package) error {
|
||||
|
||||
@ -10,7 +10,7 @@ func GetCveReferenceURL(cve string) string {
|
||||
}
|
||||
|
||||
func GetCweReferenceURL(cwe string) string {
|
||||
return fmt.Sprintf("https://cwe.mitre.org/data/definitions/%s.html", strings.TrimPrefix(cwe, "CWE-")) // CWE Rquire only the number, ie. CWE-123 -> 123
|
||||
return fmt.Sprintf("https://cwe.mitre.org/data/definitions/%s.html", strings.TrimPrefix(cwe, "CWE-")) // CWE Require only the number, ie. CWE-123 -> 123
|
||||
}
|
||||
|
||||
func GetGhsaReferenceURL(ghsa string) string {
|
||||
|
||||
@ -103,7 +103,7 @@ var lockfileAsMapByExtension map[string]string = map[string]string{
|
||||
}
|
||||
|
||||
// Maintain a map of standard filenames to a custom parser. This has
|
||||
// higher precendence that lockfile package. Graph parsers discover
|
||||
// a higher precedence than lockfile package. Graph parsers discover
|
||||
// reference to this map to resolve the lockfileAs from base filename
|
||||
var lockfileAsMapByPath map[string]string = map[string]string{
|
||||
".terraform.lock.hcl": customParserTerraform,
|
||||
|
||||
@ -13,7 +13,7 @@ import (
|
||||
)
|
||||
|
||||
// The order of regexp is important as it gives the precedence of range that we
|
||||
// want to consider. Exact match is always highest precendence. We pessimistically
|
||||
// want to consider. Exact match is always highest precedence. We pessimistically
|
||||
// consider the lower version in the range
|
||||
var pyWheelVersionMatchers []*regexp.Regexp = []*regexp.Regexp{
|
||||
regexp.MustCompile(`==([0-9\\.]+)`),
|
||||
|
||||
@ -4,7 +4,7 @@ package reporter
|
||||
// This report is same for most of gitlab scanners, types
|
||||
// and schemas.
|
||||
//
|
||||
// We are using Schema Verison 15.2.1 for dependency_scanning report.
|
||||
// We are using Schema Version 15.2.1 for dependency_scanning report.
|
||||
// All the versions are available at: https://gitlab.com/gitlab-org/security-products/security-report-schemas
|
||||
|
||||
import (
|
||||
|
||||
Loading…
x
Reference in New Issue
Block a user