-
Currently we implemented CSAF as trusted provider.
The [description for csaf providers](https://docs.oasis-open.org/csaf/csaf/v2.0/cs03/csaf-v2.0-cs03.html#722-role-csaf-provider) states:
`satisfie…
-
Currently the checker issues at our side 3x success ("type": 0) for requirements 8, 9 and 10 with following messages:
"Performed no in-depth test of security.txt."
"Since no valid provider-metadat…
-
"version": "0.9.4-30-g0375e22",
If the provider-metadata.json is a non-valid json document, the following result is returned.
```
{
"num": 7,
"description": "provider-me…
-
With #324 the full JSON output was added:
```
{
"tests": [
{
"errors": [],
"warnings": [],
"infos": [
{
"instancePath": "/vulnerabilities/0/scores/0"…
-
-
I want to try to install in ubuntu but unable to run this . guide me which set up run to first .
-
Please add an option to see the results of the remote validator (as one could use that to run optional or informative tests).
_Originally posted by @tschmidtb51 in https://github.com/csaf-poc/csaf_…
-
Code and test shows that the downloader has a default limiting rate of 1 in main.
But `--help` does not say for the downloader and the checker and the documentaton for aggregator says unlimited, wh…
-
The current description for configuration of `update_intevall` can be improved:
```
If a provider's domain starts with https:// its considered a publisher.
These publishers are added to the csaf_…
-
In branch https://github.com/csaf-poc/csaf_distribution/tree/remote_validator_client
there is an experimental testing tool to ask a service like https://github.com/secvisogram/csaf-validator-service …