Skip to content

Conversation

@dependabot
Copy link
Contributor

@dependabot dependabot bot commented on behalf of github Nov 26, 2025

Bumps the go_modules group with 2 updates in the / directory: github.com/google/osv-scalibr and golang.org/x/crypto.

Updates github.com/google/osv-scalibr from 0.2.1 to 0.3.4

Release notes

Sourced from github.com/google/osv-scalibr's releases.

v0.3.4

  • New secret detectors: DigitalOcean API keys, OpenAI project keys, Tink plaintext keysets, GitLab PAT, HashiCorp Vault+App tokens, GitHub app refresh tokens
    • See the docs for an overview of all currently supported secret types.
  • Luarocks software extractor
  • Secret detection+validation can now be enabled individually with e.g. --plugins=secrets/gcpsak,secrets/gcpsakvalidate
  • Support fetching Maven dependencies from Artifact Registry
  • Improvements to semantic version comparison

v0.3.3

  • Vulnerability matching on Extracted packages with OSV.dev: Enable in the CLI with --plugins=vulnmatch/osvdev
  • Secret extractors with validation: Anthropic API keys, Perplexity API keys, Grok xAI API keys, Docker Hub PAT, private keys,
  • Inventory extractors: MacPorts, Winget, asdf package manager, Nimble
  • Vuln detectors: Docker Socket Exposure

Thanks to all Patch Reward Program participants for the new plugins!

If you're interested in contributing through the PRP yourself and earning rewards, check out https://bughunters.google.com/about/rules/open-source/6436351477940224/osv-scalibr-patch-rewards-program-rules

v0.3.2

  • New plugins: Dockerfile base images, network ports for MacOS, EoL linux distros, transitive requirements.txt dependencies, VEXing for DPKG packages without any binaries, software licenses
  • Additional binary types supported by the unknown binary extractor
  • CLI flag for scanning a local docker image
  • Annotation for NPM packages that are actually installed from NPM repositories
  • Support more ecosystems for version comparison

v0.3.1

  • Annotation for language packages already found by OS package for RPM, COS, APK
  • npm-shrinkwrap.json extraction
  • Secret scanning, supporting detection of GCP Service Account keys
  • Reachability analysis for Java
  • VEX annotation to mark false positive vulnerabilities
  • Unknown binary identification
  • CLI changes: --plugins= as a unified plugin enablement method
  • New Finding Format

v0.3.0

  • New CLI flags: --version, --cdx-component-type
  • New Plugins: Annotation for language packages already found by OS package for DPKG, transitive requirements.txt extraction
  • Potentially breaking API changes: Moved ToPURL, Ecosystem from Extractor to Package, changed Package.Extractor to Package.Plugins
  • Switched to cgo-less SQLite driver to avoid dependency on C code
  • Support for Extractors that run on whole directories instead of individual files
Commits
  • 8930967 Bump SCALIBR version to 0.3.4 in preparation for a new release.
  • 7fe1be3 Merge pull request #1376 from ackama:lint/iotamixing
  • ecec01c Merge pull request #1374 from ackama:semantic/reuse-helper
  • 1645031 Merge pull request #1377 from ackama:lint/cleanup-docs
  • f4852e8 Remove contributor stat posting from the PRP automation script
  • 227a03a chore: make godoc comments more consistent
  • 16775da refactor: put non-iota const in its own block
  • ffcac96 refactor(semantic): reuse existing function rather than regex for checking di...
  • bcadd5b Merge pull request #1335 from doyensec:veles-secrets-github-app-refresh-tokens
  • 5312e19 edit: remove secret detection bypass
  • Additional commits viewable in compare view

Updates golang.org/x/crypto from 0.40.0 to 0.45.0

Commits
  • 4e0068c go.mod: update golang.org/x dependencies
  • e79546e ssh: curb GSSAPI DoS risk by limiting number of specified OIDs
  • f91f7a7 ssh/agent: prevent panic on malformed constraint
  • 2df4153 acme/autocert: let automatic renewal work with short lifetime certs
  • bcf6a84 acme: pass context to request
  • b4f2b62 ssh: fix error message on unsupported cipher
  • 79ec3a5 ssh: allow to bind to a hostname in remote forwarding
  • 122a78f go.mod: update golang.org/x dependencies
  • c0531f9 all: eliminate vet diagnostics
  • 0997000 all: fix some comments
  • Additional commits viewable in compare view

Updates github.com/opencontainers/selinux from 1.11.0 to 1.12.0

Release notes

Sourced from github.com/opencontainers/selinux's releases.

v1.12.0

This release removes deprecated functions from the label package, and improves documentation and error reporting of SetCreateKey.

What's Changed

Full Changelog: opencontainers/selinux@v1.11.1...v1.12.0

v1.11.1

What's Changed

New Contributors

Full Changelog: opencontainers/selinux@v1.11.0...v1.11.1

Commits
  • 996c4cf Merge pull request #227 from kolyshkin/fix-flake
  • 2a69eaf ci: add tests to check for races
  • 965323e SetKeyLabel: add thread group leader requirement
  • 4c76c01 TestSocketLabel: use LockOSThread to avoid flakes
  • 13b180a TestSELinux: use LockOSThread to avoid flakes
  • 03cde75 Merge pull request #228 from kolyshkin/label-rm-depr
  • 6f9de93 label: remove deprecated stuff
  • 931542d label: stop using deprecated stuff in tests
  • 21fd359 Merge pull request #218 from kolyshkin/ci-bumps
  • 346dfb5 Merge pull request #223 from AkihiroSuda/vm
  • Additional commits viewable in compare view

You can trigger a rebase of this PR by commenting @dependabot rebase.


Dependabot commands and options

You can trigger Dependabot actions by commenting on this PR:

  • @dependabot rebase will rebase this PR
  • @dependabot recreate will recreate this PR, overwriting any edits that have been made to it
  • @dependabot merge will merge this PR after your CI passes on it
  • @dependabot squash and merge will squash and merge this PR after your CI passes on it
  • @dependabot cancel merge will cancel a previously requested merge and block automerging
  • @dependabot reopen will reopen this PR if it is closed
  • @dependabot close will close this PR and stop Dependabot recreating it. You can achieve the same result by closing it manually
  • @dependabot show <dependency name> ignore conditions will show all of the ignore conditions of the specified dependency
  • @dependabot ignore <dependency name> major version will close this group update PR and stop Dependabot creating any more for the specific dependency's major version (unless you unignore this specific dependency's major version or upgrade to it yourself)
  • @dependabot ignore <dependency name> minor version will close this group update PR and stop Dependabot creating any more for the specific dependency's minor version (unless you unignore this specific dependency's minor version or upgrade to it yourself)
  • @dependabot ignore <dependency name> will close this group update PR and stop Dependabot creating any more for the specific dependency (unless you unignore this specific dependency or upgrade to it yourself)
  • @dependabot unignore <dependency name> will remove all of the ignore conditions of the specified dependency
  • @dependabot unignore <dependency name> <ignore condition> will remove the ignore condition of the specified dependency and ignore conditions
    You can disable automated security fix PRs for this repo from the Security Alerts page.

Note
Automatic rebases have been disabled on this pull request as it has been open for over 30 days.

@dependabot dependabot bot added the dependencies Pull requests that update a dependency file label Nov 26, 2025
@google-oss-prow
Copy link

[APPROVALNOTIFIER] This PR is NOT APPROVED

This pull-request has been approved by: dependabot[bot]
Once this PR has been reviewed and has the lgtm label, please assign ekremenetskii for approval. For more information see the Kubernetes Code Review Process.

The full list of commands accepted by this bot can be found here.

Details Needs approval from an approver in each of these files:

Approvers can indicate their approval by writing /approve in a comment
Approvers can cancel approval by writing /approve cancel in a comment

@google-oss-prow
Copy link

Hi @dependabot[bot]. Thanks for your PR.

I'm waiting for a GoogleCloudPlatform member to verify that this patch is reasonable to test. If it is, they should reply with /ok-to-test on its own line. Until that is done, I will not automatically test new commits in this PR, but the usual testing commands by org members will still work. Regular contributors should join the org to skip this step.

Once the patch is verified, the new status will be reflected by the ok-to-test label.

I understand the commands that are listed here.

Details

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository.

@dependabot dependabot bot force-pushed the dependabot/go_modules/go_modules-e6f5fe520a branch from 72f6c7e to 0d2fe1d Compare November 28, 2025 14:19
@dependabot dependabot bot force-pushed the dependabot/go_modules/go_modules-e6f5fe520a branch from 0d2fe1d to adfe37a Compare December 11, 2025 13:48
@dependabot dependabot bot force-pushed the dependabot/go_modules/go_modules-e6f5fe520a branch 2 times, most recently from 1c95d0c to 6c086e3 Compare December 22, 2025 15:23
@burov
Copy link
Member

burov commented Dec 22, 2025

@dependabot rebase

@dependabot @github
Copy link
Contributor Author

dependabot bot commented on behalf of github Dec 22, 2025

Looks like this PR is already up-to-date with master! If you'd still like to recreate it from scratch, overwriting any edits, you can request @dependabot recreate.

@burov
Copy link
Member

burov commented Jan 19, 2026

/gcbrun

@burov
Copy link
Member

burov commented Jan 21, 2026

@dependabot rebase

Bumps the go_modules group with 2 updates in the / directory: [github.com/google/osv-scalibr](https://github.com/google/osv-scalibr) and [golang.org/x/crypto](https://github.com/golang/crypto).


Updates `github.com/google/osv-scalibr` from 0.2.1 to 0.3.4
- [Release notes](https://github.com/google/osv-scalibr/releases)
- [Commits](google/osv-scalibr@v0.2.1...v0.3.4)

Updates `golang.org/x/crypto` from 0.40.0 to 0.45.0
- [Commits](golang/crypto@v0.40.0...v0.45.0)

Updates `github.com/opencontainers/selinux` from 1.11.0 to 1.12.0
- [Release notes](https://github.com/opencontainers/selinux/releases)
- [Commits](opencontainers/selinux@v1.11.0...v1.12.0)

---
updated-dependencies:
- dependency-name: github.com/google/osv-scalibr
  dependency-version: 0.3.4
  dependency-type: direct:production
  dependency-group: go_modules
- dependency-name: golang.org/x/crypto
  dependency-version: 0.45.0
  dependency-type: direct:production
  dependency-group: go_modules
- dependency-name: github.com/opencontainers/selinux
  dependency-version: 1.12.0
  dependency-type: indirect
  dependency-group: go_modules
...

Signed-off-by: dependabot[bot] <[email protected]>
@dependabot dependabot bot force-pushed the dependabot/go_modules/go_modules-e6f5fe520a branch from 6c086e3 to 2d65bb9 Compare January 21, 2026 10:01
@burov
Copy link
Member

burov commented Jan 21, 2026

/gcbrun

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

dependencies Pull requests that update a dependency file needs-ok-to-test size/L

Projects

None yet

Development

Successfully merging this pull request may close these issues.

1 participant