Vulnix

Latest version: v1.10.1

Safety actively analyzes 688532 Python packages for vulnerabilities to keep your Python projects secure.

Scan your dependencies

Page 4 of 6

1.6.0

------------------

- Completely reworked whitelisting subsystem. Whitelists can now be written as
TOML files and support a more expressive range of options including expiry
datedates. The old YAML syntax is still supported (36).
- Ignore case when guessing CVE identifiers from patch file names (thanks to
adisbladis).
- Add man pages (29).

1.4.0

------------------

- Guesses applied CVE patches out of the `patches` derivation envVar (see
nixpkgs FC-15660).

1.3.4

------------------

- Add '--no-requisites' flag which stops vulnix from determining the transitive
closure of derivations passed on the command line.
- Provide structured JSON output with `--json`.
- Remove whitelist from README as it is quite buggy right now.

1.3.3

------------------

- Fix return code bug (FC-28741).
- Fix partial whitelisting of products where several vulnerable versions are
present on the system at the same time (24).
- Improve error reporting for incorrectly formed whitelist rules.

1.3.2

------------------

- Minor: fix packaging issues.

1.3.1

------------------

- Security: Fix arbitrary code execution bug during derivation evaluation.

Page 4 of 6

© 2024 Safety CLI Cybersecurity Inc. All Rights Reserved.