-
Notifications
You must be signed in to change notification settings - Fork 9
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
ci: Consider scanning clj-watson with clj-watson #84
Comments
These are the CVEs that |
I enabled |
I've been running this over and over as my test but have not taken the time to read it! I'll take a peek. These seem fixable:
These all share the same: CVE-2022-4244, CVE-2022-4245
Analyzing false-positives is a bit tortuous, but I think the plexuses (plexi?) might be false positives: jeremylong/DependencyCheck#5973, I think the CVEs are talking about plexus-utils.
|
I've removed the milestone because I don't want us to get distracted with addressing these until we have 6.0 and 6.1 out the door. |
Sure that's fine, but TLDR: I think we won't have any unfixable vulnerabilities for clj-watson itself. |
We should check if clj-watson deps have CVEs.
And what better way to do that than with clj-watson?
The text was updated successfully, but these errors were encountered: