You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
The purpose of this issue is to investigate the feasibility and added value of integrating the osv-scanner into our Django template project. This exploration will assess whether osv-scanner can complement or enhance the security measures provided by GitHub Dependabot by identifying known vulnerabilities in the dependencies used by our Django projects.
📕 Context
Our Django template project is designed to streamline the setup of new Django projects with predefined configurations. These projects often utilize various external packages, necessitating robust security and dependency management practices. Currently, we use GitHub Dependabot to monitor and update dependencies based on known vulnerabilities. As we continually update and expand our dependencies, we are interested in assessing whether integrating osv-scanner can provide additional security benefits.
Comparative Analysis: An analysis comparing osv-scanner with GitHub Dependabot, focusing on features, efficiency, and detection capabilities.
Architecture Decision Record (ADR): Document the results of the osv-scanner analysis in an ADR to formally capture the decision-making process and outcomes.
The text was updated successfully, but these errors were encountered:
Note that our current tool for vulnerability scanning is osv-detector, which is something of a precursor to the scanner - it's expected at some point that we'll switch to using the scanner but for now we should start with the detector for consistency across our stacks.
🎯 Aim
The purpose of this issue is to investigate the feasibility and added value of integrating the osv-scanner into our Django template project. This exploration will assess whether osv-scanner can complement or enhance the security measures provided by GitHub Dependabot by identifying known vulnerabilities in the dependencies used by our Django projects.
📕 Context
Our Django template project is designed to streamline the setup of new Django projects with predefined configurations. These projects often utilize various external packages, necessitating robust security and dependency management practices. Currently, we use GitHub Dependabot to monitor and update dependencies based on known vulnerabilities. As we continually update and expand our dependencies, we are interested in assessing whether integrating osv-scanner can provide additional security benefits.
📝 Relevant resources/doc's/people
✅ Acceptance Criteria
The text was updated successfully, but these errors were encountered: