You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: .github/README.md
+41-40Lines changed: 41 additions & 40 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -57,7 +57,7 @@ Click **STAR** to leave encouragement.
57
57
OpenSCA is now capable of parsing configuration files in the listed programming languages and correspondent package managers. The team is now dedicated to introducing more languages and enriching the parsing of relevant configuration files gradually.
|`config`|`string`| Set the path of the configuration file |`-config config.json`|
130
+
|`path`|`string`| Set the path of the target file or directory |`-path ./foo`|
131
+
|`out`|`string`| Save the result to the specified file whose format is defined by the suffix |`-out out.json, out.html`|
132
+
|`log`|`string`| Specify the path of log file |`-log my_log.txt`|
133
+
|`token`|`string`| Cloud service verification from our offical website |`-token xxx`|
134
+
|`proj`|`string`| SaaS project `token` to sync report with [OpenSCA SaaS](https://opensca.xmirror.cn/console) |`-proj xxx`|
135
135
136
136
From v3.0.0, apart from these parameters available forCMD/CRT, there are also others for different requirements which have to be setin the configuration file.
137
137
@@ -157,18 +157,19 @@ Using previous versions to connect the cloud databse will still need the setting
157
157
158
158
Files supported by the `out` parameter are listed below:
| `vendor` | the manufacturer of the component | N |
238
+
| `product` | the name of the component | Y |
239
+
| `version` | the versions of the component affected by the vulnerability | Y |
240
+
| `language` | the programming language of the component | Y |
241
+
| `name` | the name of the vulnerability | N |
242
+
| `id` | custom identifier | Y |
243
+
| `cve_id` | cve identifier | N |
244
+
| `cnnvd_id` | cnnvd identifier | N |
245
+
| `cnvd_id` | cnvd identifier | N |
246
+
| `cwe_id` | cwe identifier | N |
247
+
| `description` | the descripation of the vulnerability | N |
248
+
| `description_en` | the descripation of the vulnerability in English | N |
249
+
| `suggestion` | the suggestion for fixing the vulnerability | N |
250
+
| `attack_type` | the type of attack | N |
251
+
| `release_date` | the release date of the vulnerability | N |
252
+
| `security_level_id` | the security level of the vulnerability (diminishing from 1 to 4) | N |
253
+
| `exploit_level_id` | the exploit level of the vulnerability (-2:unknown,-1:difficult,0:difficult,1:easy,2:normal) | N |
253
254
254
255
*There are several pre-set values to the "language" field, including java, javascript, golang, rust, php, ruby and python. Other languages are not limited to the pre-set value.
0 commit comments