-
Notifications
You must be signed in to change notification settings - Fork 62
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Get vulnerability score/severity with pip-audit #654
Comments
Thank you for opening an issue, and for following our template! Some previous discussion here: #207 (specifically, #207 (comment) and below) To summarize some of the concerns raised there:
TL;DR: If I'm happy to give your changes in #653 a review if you'd like, but using the NVD API is likely to be a non-starter. |
Good feedback William, thanks! At the best of your knowledge, do you know if there is any plans, or if there has been any discussions in either PyPI or OSV for adding some sort of vulnerability info? Also, not fully familiar with how PYSEC/CVE, and GHSA relate to each other. Is it possible that a PYSEC ID has neither a GHSA nor a CVE counterpart? |
I think the upstream issue in OSV is google/osv.dev#783, PyPI would be able to add CVSS scores once OSV supported it. |
It's currently unlikely, but it's technically possible: PYSEC IDs come from a separate database which is back-populated with relevant CVEs, but it's possible that future vulnerabilities are "unique" to PYSEC or may appear in PYSEC before appearing in other feeds (roughly analogously to RUSTSEC). |
I understand. Thank you both for the info! |
Is your feature request related to a problem? Please describe.
We would like to be able to see the severity of vulnerabilities detected, and ideally filter them out based on being above/below a given threshold.
Describe the solution you'd like
Adding score/severity the information to the output would be a first step for enabling the user to ideally pipe the output to a json and have some case/if downstream based on that.
Ideally one could go even further and perhaps pass a
--threshold
flag for muting vulnerabilities below a given scoreDescribe alternatives you've considered
I drafted a PR for addressing the first part of the problem, providing score/severity, #653.
An alternative would be using pip-audit as it is, and calling the nvd api using pip-audit output as input. The main risk here is creating a dependency on a third-party api
Additional context
The text was updated successfully, but these errors were encountered: