govulncheck to report known vulnerabilities#2631
Conversation
Signed-off-by: CrazyMax <1951866+crazy-max@users.noreply.github.com>
|
Oh! Been planning for some time to look at something like this! I may borrow this (or of course happy to review a PR 😁) |
Yes I think we should have something similar across our projects. I will look to open follow-ups on buildkit and moby |
|
After merging we got one reported for Sad that region in And as we can see dependabot also opened a PR #2634 but as stated in #2631 (comment) we should just disable dependabot for security updates and track this ourselves. |


Runs govulncheck tool in our workflow to report known vulnerabilities that affect Go code using the Go vulnerability database at https://vuln.go.dev/ and output a SARIF report that will be uploaded to GitHub Code scanning so we have these issues reported in the Security tab like we have done with Docker Scout in #2624.
Atm dependabot will open a pull request when such vulnerabilities are found similar to #2337 but we often close them because it needs coordination with upstream repositories first.
I suggest to disable security updates for Dependabot under https://github.com/docker/buildx/settings/security_analysis and check issues reported in the Security tab instead with this workflow if we are ok with it: