Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Solution to scan the environment.yml python dependencies using OWASP Dep Check in Jenkins pipeline #6637

Open
Aseem-DevOps opened this issue May 2, 2024 · 1 comment

Comments

@Aseem-DevOps
Copy link

Hi,

I'm using a dependency check 8.2.0 version via Jenkins file and following below set-up as one of the stage - but every time I see, report generates with zero vulnerabilities.

after the scm checkout, I expected to consider an environment.yml file which contains the dependencies associated for the python application. But I am sure it's not getting scanned. So I added --enableExperimental to have this from a python analyzer standpoint.

stage('OWASP Scan') {
steps {
dependencyCheck additionalArguments: '''
-o './'
-s './'
-f 'ALL'
--enableExperimental
--prettyPrint''', odcInstallation: 'dependency-checker'
dependencyCheckPublisher pattern: 'dependency-check-report.xml'
}
}

Any help in this regard would be much appreciated..

image

@jeremylong
Copy link
Owner

We do not currently support conda's environment.yml files yet. We accept PRs if you are interested in contributing.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

No branches or pull requests

2 participants