Documentation
¶
Overview ¶
Package cve20236019 implements a SCALIBR Detector for CVE-2023-6019 To test, install a vulnerable Ray version: python3 -m pip install ray==2.6.3 Start the Ray dashboard: python3 -c "import ray; context = ray.init(); print(context)" Run the detector
Index ¶
- Constants
- func New() detector.Detector
- type Detector
- func (d Detector) DetectedFinding() inventory.Finding
- func (Detector) Name() string
- func (Detector) RequiredExtractors() []string
- func (Detector) Requirements() *plugin.Capabilities
- func (d Detector) Scan(ctx context.Context, scanRoot *scalibrfs.ScanRoot, ...) (inventory.Finding, error)
- func (Detector) Version() int
Constants ¶
View Source
const (
// Name of the detector.
Name = "cve/cve-2023-6019"
)
Variables ¶
This section is empty.
Functions ¶
Types ¶
type Detector ¶
type Detector struct{}
Detector is a SCALIBR Detector for CVE-2023-6019
func (Detector) DetectedFinding ¶ added in v0.3.1
DetectedFinding returns generic vulnerability information about what is detected.
func (Detector) RequiredExtractors ¶
RequiredExtractors returns the list of OS package extractors needed to detect the presence of the Ray package
func (Detector) Requirements ¶
func (Detector) Requirements() *plugin.Capabilities
Requirements of the detector
Click to show internal directories.
Click to hide internal directories.