mirror of
https://github.com/safedep/vet.git
synced 2025-12-11 01:01:10 -06:00
chore: correct typos (#460)
This commit is contained in:
parent
7f88f83a8c
commit
03e1a10c1d
@ -130,7 +130,7 @@ func (a *malwareAnalyzer) Finish() error {
|
|||||||
// The decision involves:
|
// The decision involves:
|
||||||
//
|
//
|
||||||
// - No action if the package is not classified as malware
|
// - No action if the package is not classified as malware
|
||||||
// - Malware if a verfication record is available to confirm
|
// - Malware if a verification record is available to confirm
|
||||||
// - Malware if `TrustAutomatedAnalysis` config is enabled and confidence is high
|
// - Malware if `TrustAutomatedAnalysis` config is enabled and confidence is high
|
||||||
// - Suspicious for all other cases
|
// - Suspicious for all other cases
|
||||||
func (a *malwareAnalyzer) applyMalwareDecision(pkg *models.Package) error {
|
func (a *malwareAnalyzer) applyMalwareDecision(pkg *models.Package) error {
|
||||||
|
|||||||
@ -10,7 +10,7 @@ func GetCveReferenceURL(cve string) string {
|
|||||||
}
|
}
|
||||||
|
|
||||||
func GetCweReferenceURL(cwe string) string {
|
func GetCweReferenceURL(cwe string) string {
|
||||||
return fmt.Sprintf("https://cwe.mitre.org/data/definitions/%s.html", strings.TrimPrefix(cwe, "CWE-")) // CWE Rquire only the number, ie. CWE-123 -> 123
|
return fmt.Sprintf("https://cwe.mitre.org/data/definitions/%s.html", strings.TrimPrefix(cwe, "CWE-")) // CWE Require only the number, ie. CWE-123 -> 123
|
||||||
}
|
}
|
||||||
|
|
||||||
func GetGhsaReferenceURL(ghsa string) string {
|
func GetGhsaReferenceURL(ghsa string) string {
|
||||||
|
|||||||
@ -103,7 +103,7 @@ var lockfileAsMapByExtension map[string]string = map[string]string{
|
|||||||
}
|
}
|
||||||
|
|
||||||
// Maintain a map of standard filenames to a custom parser. This has
|
// Maintain a map of standard filenames to a custom parser. This has
|
||||||
// higher precendence that lockfile package. Graph parsers discover
|
// a higher precedence than lockfile package. Graph parsers discover
|
||||||
// reference to this map to resolve the lockfileAs from base filename
|
// reference to this map to resolve the lockfileAs from base filename
|
||||||
var lockfileAsMapByPath map[string]string = map[string]string{
|
var lockfileAsMapByPath map[string]string = map[string]string{
|
||||||
".terraform.lock.hcl": customParserTerraform,
|
".terraform.lock.hcl": customParserTerraform,
|
||||||
|
|||||||
@ -13,7 +13,7 @@ import (
|
|||||||
)
|
)
|
||||||
|
|
||||||
// The order of regexp is important as it gives the precedence of range that we
|
// The order of regexp is important as it gives the precedence of range that we
|
||||||
// want to consider. Exact match is always highest precendence. We pessimistically
|
// want to consider. Exact match is always highest precedence. We pessimistically
|
||||||
// consider the lower version in the range
|
// consider the lower version in the range
|
||||||
var pyWheelVersionMatchers []*regexp.Regexp = []*regexp.Regexp{
|
var pyWheelVersionMatchers []*regexp.Regexp = []*regexp.Regexp{
|
||||||
regexp.MustCompile(`==([0-9\\.]+)`),
|
regexp.MustCompile(`==([0-9\\.]+)`),
|
||||||
|
|||||||
@ -4,7 +4,7 @@ package reporter
|
|||||||
// This report is same for most of gitlab scanners, types
|
// This report is same for most of gitlab scanners, types
|
||||||
// and schemas.
|
// and schemas.
|
||||||
//
|
//
|
||||||
// We are using Schema Verison 15.2.1 for dependency_scanning report.
|
// We are using Schema Version 15.2.1 for dependency_scanning report.
|
||||||
// All the versions are available at: https://gitlab.com/gitlab-org/security-products/security-report-schemas
|
// All the versions are available at: https://gitlab.com/gitlab-org/security-products/security-report-schemas
|
||||||
|
|
||||||
import (
|
import (
|
||||||
|
|||||||
Loading…
x
Reference in New Issue
Block a user