void |
AbstractAnalyzer.analyze(Dependency dependency,
Engine engine) |
Analyzes a given dependency.
|
void |
Analyzer.analyze(Dependency dependency,
Engine engine) |
Analyzes the given dependency.
|
protected abstract void |
AbstractAnalyzer.analyzeDependency(Dependency dependency,
Engine engine) |
Analyzes a given dependency.
|
protected void |
AbstractDependencyComparingAnalyzer.analyzeDependency(Dependency ignore,
Engine engine) |
Analyzes a set of dependencies.
|
protected void |
AbstractSuppressionAnalyzer.analyzeDependency(Dependency dependency,
Engine engine) |
|
void |
ArchiveAnalyzer.analyzeDependency(Dependency dependency,
Engine engine) |
Analyzes a given dependency.
|
void |
ArtifactoryAnalyzer.analyzeDependency(Dependency dependency,
Engine engine) |
Performs the analysis.
|
void |
AssemblyAnalyzer.analyzeDependency(Dependency dependency,
Engine engine) |
Performs the analysis on a single Dependency.
|
protected void |
AutoconfAnalyzer.analyzeDependency(Dependency dependency,
Engine engine) |
|
protected void |
CarthageAnalyzer.analyzeDependency(Dependency dependency,
Engine engine) |
|
void |
CentralAnalyzer.analyzeDependency(Dependency dependency,
Engine engine) |
Performs the analysis.
|
protected void |
CMakeAnalyzer.analyzeDependency(Dependency dependency,
Engine engine) |
Analyzes python packages and adds evidence to the dependency.
|
protected void |
CocoaPodsAnalyzer.analyzeDependency(Dependency dependency,
Engine engine) |
|
protected void |
ComposerLockAnalyzer.analyzeDependency(Dependency dependency,
Engine engine) |
Entry point for the analyzer.
|
protected void |
CPEAnalyzer.analyzeDependency(Dependency dependency,
Engine engine) |
Analyzes a dependency and attempts to determine if there are any CPE
identifiers for this dependency.
|
protected void |
CpeSuppressionAnalyzer.analyzeDependency(Dependency dependency,
Engine engine) |
|
protected void |
DartAnalyzer.analyzeDependency(Dependency dependency,
Engine engine) |
|
protected void |
ElixirMixAuditAnalyzer.analyzeDependency(Dependency dependency,
Engine engine) |
Determines if the analyzer can analyze the given file type.
|
protected void |
FalsePositiveAnalyzer.analyzeDependency(Dependency dependency,
Engine engine) |
Analyzes the dependencies and removes bad/incorrect CPE associations
based on various heuristics.
|
protected void |
FileNameAnalyzer.analyzeDependency(Dependency dependency,
Engine engine) |
Collects information about the file name.
|
protected void |
GolangDepAnalyzer.analyzeDependency(Dependency dependency,
Engine engine) |
Analyzes go packages and adds evidence to the dependency.
|
protected void |
GolangModAnalyzer.analyzeDependency(Dependency dependency,
Engine engine) |
Analyzes go packages and adds evidence to the dependency.
|
protected void |
HintAnalyzer.analyzeDependency(Dependency dependency,
Engine engine) |
The HintAnalyzer uses knowledge about a dependency to add additional
information to help in identification of identifiers or vulnerabilities.
|
void |
JarAnalyzer.analyzeDependency(Dependency dependency,
Engine engine) |
Loads a specified JAR file and collects information from the manifest and
checksums to identify the correct CPE information.
|
protected void |
KnownExploitedVulnerabilityAnalyzer.analyzeDependency(Dependency dependency,
Engine engine) |
Adds information about the known exploited vulnerabilities to the
analysis.
|
void |
LibmanAnalyzer.analyzeDependency(Dependency dependency,
Engine engine) |
Performs the analysis.
|
protected void |
MSBuildProjectAnalyzer.analyzeDependency(Dependency dependency,
Engine engine) |
|
void |
NexusAnalyzer.analyzeDependency(Dependency dependency,
Engine engine) |
Performs the analysis.
|
protected void |
NodeAuditAnalyzer.analyzeDependency(Dependency dependency,
Engine engine) |
|
protected void |
NodePackageAnalyzer.analyzeDependency(Dependency dependency,
Engine engine) |
|
protected void |
NpmCPEAnalyzer.analyzeDependency(Dependency dependency,
Engine engine) |
Analyzes a dependency and attempts to determine if there are any CPE
identifiers for this dependency.
|
void |
NugetconfAnalyzer.analyzeDependency(Dependency dependency,
Engine engine) |
Performs the analysis.
|
void |
NuspecAnalyzer.analyzeDependency(Dependency dependency,
Engine engine) |
Performs the analysis.
|
protected void |
NvdCveAnalyzer.analyzeDependency(Dependency dependency,
Engine engine) |
Analyzes a dependency and attempts to determine if there are any CPE
identifiers for this dependency.
|
protected void |
OpenSSLAnalyzer.analyzeDependency(Dependency dependency,
Engine engine) |
Analyzes python packages and adds evidence to the dependency.
|
protected void |
OssIndexAnalyzer.analyzeDependency(Dependency dependency,
Engine engine) |
|
protected void |
PEAnalyzer.analyzeDependency(Dependency dependency,
Engine engine) |
Collects information about the file name.
|
protected void |
PerlCpanfileAnalyzer.analyzeDependency(Dependency dependency,
Engine engine) |
|
protected void |
PinnedMavenInstallAnalyzer.analyzeDependency(Dependency dependency,
Engine engine) |
|
protected void |
PipAnalyzer.analyzeDependency(Dependency dependency,
Engine engine) |
|
protected void |
PipfileAnalyzer.analyzeDependency(Dependency dependency,
Engine engine) |
|
protected void |
PipfilelockAnalyzer.analyzeDependency(Dependency dependency,
Engine engine) |
|
protected void |
PnpmAuditAnalyzer.analyzeDependency(Dependency dependency,
Engine engine) |
Analyzes the pnpm lock file to determine vulnerable dependencies.
|
protected void |
PoetryAnalyzer.analyzeDependency(Dependency dependency,
Engine engine) |
Analyzes poetry packages and adds evidence to the dependency.
|
protected void |
PythonDistributionAnalyzer.analyzeDependency(Dependency dependency,
Engine engine) |
|
protected void |
PythonPackageAnalyzer.analyzeDependency(Dependency dependency,
Engine engine) |
Analyzes python packages and adds evidence to the dependency.
|
void |
RetireJsAnalyzer.analyzeDependency(Dependency dependency,
Engine engine) |
Analyzes the specified JavaScript file.
|
protected void |
RubyBundleAuditAnalyzer.analyzeDependency(Dependency dependency,
Engine engine) |
Determines if the analyzer can analyze the given file type.
|
protected void |
RubyBundlerAnalyzer.analyzeDependency(Dependency dependency,
Engine engine) |
|
protected void |
RubyGemspecAnalyzer.analyzeDependency(Dependency dependency,
Engine engine) |
|
protected void |
SwiftPackageManagerAnalyzer.analyzeDependency(Dependency dependency,
Engine engine) |
|
protected void |
SwiftPackageResolvedAnalyzer.analyzeDependency(Dependency dependency,
Engine engine) |
|
protected void |
UnusedSuppressionRuleAnalyzer.analyzeDependency(Dependency dependency,
Engine engine) |
|
protected void |
VersionFilterAnalyzer.analyzeDependency(Dependency dependency,
Engine engine) |
The HintAnalyzer uses knowledge about a dependency to add additional
information to help in identification of identifiers or vulnerabilities.
|
protected void |
VulnerabilitySuppressionAnalyzer.analyzeDependency(Dependency dependency,
Engine engine) |
|
protected void |
YarnAuditAnalyzer.analyzeDependency(Dependency dependency,
Engine engine) |
Analyzes the yarn lock file to determine vulnerable dependencies.
|
protected boolean |
JarAnalyzer.analyzePOM(Dependency dependency,
java.util.List<JarAnalyzer.ClassNameInformation> classes,
Engine engine) |
Attempts to find a pom.xml within the JAR file.
|
protected void |
CPEAnalyzer.determineCPE(Dependency dependency) |
Searches the data store of CPE entries, trying to identify the CPE for
the given dependency based on the evidence contained within.
|
protected boolean |
CPEAnalyzer.determineIdentifiers(Dependency dependency,
java.lang.String vendor,
java.lang.String product,
Confidence currentConfidence) |
Retrieves a list of CPE values from the CveDB based on the vendor and
product passed in.
|
protected void |
PerlCpanfileAnalyzer.processFileContents(java.util.List<java.lang.String> fileLines,
java.lang.String filePath,
Engine engine) |
|
static boolean |
AbstractNpmAnalyzer.shouldProcess(java.io.File pathname) |
Determines if the path contains "/node_modules/" or "/bower_components/"
(i.e. it is a child module).
|