-
Notifications
You must be signed in to change notification settings - Fork 107
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Add list of resolved vulnerabilities to the PR Comment / Logs #717
Comments
Documenting my support of this 👍 |
Our developers frequently request this functionality as well. Many build tools, particularly in the Java ecosystem, make it difficult for developers to know locally if they've fixed a vulnerability or not. They'd like to be able to open a PR (e.g. a draft PR) and have Dependabot be able to inform them whether or not a vulnerability alert will be resolved when the PR merges. As @felickz noted above, to enable this the dependency diff API needs to report on resolved vulnerabilities. My proposal is similar but a little different - instead of using the same If GitHub can update the REST API, it's easy enough for the community to do a PR on this action to enable support for this. |
Every month or so I will raise a PR, and after merging, waiting 30-60 minutes for the pipeline to complete (depending on the application/service I'm working on) I find out that either 1. My PR didn't fix the Dependabot vulnerability that I intended to fix or 2. My PR introduced a new Dependabot vulnerability. It would be a big time saver if the PR notified the developer of any vulnerabilities that were closed or created by the PR before merging. |
👍 |
Not all here is a negative outcome, give developers a pat on the back when they are removing vulnerabilities by upgrading or removing packages (or their transitive dependencies). Consider adding to the PR summary and workflow logs the list of vulnerabilities that have been removed. This will be a great view to show when there are no outstanding open vulnerabilities and just a list of removed - the workflow we would expect most to take when iterating through resolving the issues that
dependency-review-action
highlights on a PR 🎉 !The dependency review api will return the list of vulnerabilities on removed packages, so we should have this data
The only concerning points I can find here:
removed
and then anadded
for the new versionExample Update that both adds and removes vulns
gh api /repos/octodemo/demo-vulnerabilities-ghas/dependency-graph/compare/c48a4c7abca9270ddac57bbf0bffcdc07cddc4d0...48fac5a62790ad358d078af647a0d53da6874ecb | jq '.[] | select(.name=="tar")'
The text was updated successfully, but these errors were encountered: