Give your feedback about the osvVulnerabilityAlerts experimental feature
#20542
Replies: 53 comments 115 replies
-
|
It's a really cool feature! Especially when adding a label like 'security' it gives you a nice cross repository overview. One improvement that would be welcome is the ability to have more control over major dependency updates and the 'dependencyDashboardApproval' flag. Right now, this configuration has no effect when fixedVersion reflects a major upgrade "major": {
"dependencyDashboardApproval": true
}Example issue: GHSA-r8f7-9pfq-mjmv Another improvement / feature request. Would it be possible to reflect the security risk in the PR title? Something like a Low/Medium/High/Critical suffix? |
Beta Was this translation helpful? Give feedback.
-
|
We enabled this feature yesterday and it's really really cool!
+1 - this would be an great enhancement! |
Beta Was this translation helpful? Give feedback.
-
|
i don't like the idea to enable approval for security updates. to easy to miss those updates. |
Beta Was this translation helpful? Give feedback.
-
That does make sense thinking about it. My first reaction was to initially disable it as some developers where surprised. Seeing the Maybe related. Could it be that custom packages rules where |
Beta Was this translation helpful? Give feedback.
-
Not sure about this. Depending on who reports vulns, initially they are often overrated (esp. when found via Bug Bounty programs). Over time, GHSA and other sources react on community feedback, adapt the score and renovate will silently also update the PR description. Changing the PR title would cause additional noise by renovate closing and reopeing PRs. |
Beta Was this translation helpful? Give feedback.
-
|
Relevant to some of the discussions: renovate/lib/config/options/index.ts Lines 1653 to 1672 in e87af92 I'm not aware of anyone modifying that in the past, but it was intended to be possible. It says github-only there, but I think that's only used for documentation. |
Beta Was this translation helpful? Give feedback.
-
Only if the first PR was closed. In this case you'd get a replacement with the new severity. Otherwise, you would see the title updated in-placed without closing/opening. |
Beta Was this translation helpful? Give feedback.
-
|
saw a strange security PR autoclose |
Beta Was this translation helpful? Give feedback.
-
@viceice, you've hit an edge case that occurs with only 0.58% (83 / 14311) of OSV vulnerabilities (congrats on that 😉):
PR #20512 intends to corrects this. Note that renovate still depends on semantically valid versions for comparisons. Hence, it will still not flag GHSA-gxr4-xjj5-5px2 for jquery 2.2.4, although affected. IMHO such cases should rather be corrected in the OSV advisory itself (1.2 -> 1.2.0), rather than in renovate by trying workarounds like semver-coerced versioning. |
Beta Was this translation helpful? Give feedback.
-
|
@Churro thanks for finding the cause ❤️ can you upstream the version fix too? |
Beta Was this translation helpful? Give feedback.
-
|
I really love the idea of this vulnerability alert. We also had this issue with flapping merge requests in hosted gitlab. All merge requests created by this feature were autoclosed several times. Since we have just started using renovate on that repository it didn't bother that much. I noticed it though. Another thing I noticed was the github ratelimit in this case. We authenticate to github for the release notes already with a personal token, but it seems that toen is not used for these alert. Could this be the reason for the flip flopping? If yes, how can I make renovate use the github token for these calls? |
Beta Was this translation helpful? Give feedback.
-
|
@vquie, flapping PRs are most likely related to hitting the API limit. This has been addressed with renovatebot/osv-offline#230, which found its way into renovate 34.142.0. Can you please check if the issue is gone after updating renovate? |
Beta Was this translation helpful? Give feedback.
-
|
Thanks @Churro . I just updated to the latest helm release and will monitor it. |
Beta Was this translation helpful? Give feedback.
-
|
Currently, renovate raises no vulnerability fix PRs for dependencies that are disabled explicitly or by using a preset like Proposition: Add an opt-in config flag (= disabled by default) to Any thoughts on that? Let me know if this is something you'd also find useful 👍 or not 👎 |
Beta Was this translation helpful? Give feedback.
-
|
Not sure if it's really an issue but I've observed the following message in logs for a project with NPM manager:
Is the unsupported version because of the |
Beta Was this translation helpful? Give feedback.
-
|
When using For example we have this renovate config: {
"$schema": "https://docs.renovatebot.com/renovate-schema.json",
"osvVulnerabilityAlerts": true,
"vulnerabilityAlerts": {
"enabled": true
}
}a GitHub Token and a go.mod file like module example.com/m
go 1.21
require (
github.com/argoproj/argo-cd/v2 v2.3.17
k8s.io/kubernetes v1.24.2 // indirect
)If we now run renovate we get security updates for |
Beta Was this translation helpful? Give feedback.
-
|
Is there a way to set "packageRules": [
{
"matchManagers": ["npm"],
"rangeStrategy": "bump",
"osvVulnerabilityAlerts": true
}
]...and a package with |
Beta Was this translation helpful? Give feedback.
-
|
I like the feature but we are running into issues in our setup. We use bundle-audit in our CI to check if the dependencies include known vulnerabilities. This is for ruby btw. Bundle-audit checks also indirect dependencies, which totally makes sense. Unfortunately renovate does not create prs for these. According to the documentation this is on purpose. However it would be nice if it would also update indirect dependencies, as those are equally dangerous imo. Using bundler those can be updated also if they are not part of the Gemfile. However you cannot specify a specific target version. but e.g. renovate could try to run Edit: Thinking about it more I think this could create kind of a loop or prs that update something but not fix the vulnerability. renovate would need to extract the version of the indirect dependenc from the Gemfile.lock to actually verify that a safe version is used. Not sure how straight forward that is |
Beta Was this translation helpful? Give feedback.
-
|
Hi, I would like to propose a feature request.
|
Beta Was this translation helpful? Give feedback.
-
|
Works fine so far for us. For critical cve we need to back port on older versions. Don't know if we can already do that with some workaround in the config. |
Beta Was this translation helpful? Give feedback.
-
|
We've been using this for over a year now and get a lot of value from it. One additional thing we'd like to be able to do is add the vuln id's as labels to the MRs. Does anyone know if this is possible? |
Beta Was this translation helpful? Give feedback.
-
|
"Great feature! The osvVulnerabilityAlerts provide valuable insights, but it would be helpful to have more detailed filtering options for different severity levels. Also, integrating notifications for high-priority alerts could make it even more useful. Keep up the good work!" |
Beta Was this translation helpful? Give feedback.
-
|
It looks like security updates disregard groups. Is this by design? I don't see how this would be a good thing. |
Beta Was this translation helpful? Give feedback.
-
|
Hi we are currently setting this up and are wondering: Is this affected by This is what he have set at top level and the idea is to delay the "normal" updates but we would like CVE updates to skip the waiting list so I wonder how these options interact. I didnt find the code path sadly for this so I wasnt able to figure it out myself. |
Beta Was this translation helpful? Give feedback.
-
|
It's a very cool feature! |
Beta Was this translation helpful? Give feedback.
-
Feature Request: SBOM-based Container Vulnerability ScanningProblem StatementCurrently, Renovate's Proposed Solution: SBOM IntegrationCore Concept: Enable Renovate to consume Software Bills of Materials (SBOMs) (for container images, but not limited to containers), treating them as dependency manifests similar to Implementation PhasesPhase 1: Repository-based SBOMs (MVP)
Phase 2: External SBOM SourcesTo be defined Configuration Example{
"osvVulnerabilityAlerts": true,
"sbom": {
"enabled": true,
"sources": [
{
"type": "repository",
"path": "sboms/"
}
]
}
} |
Beta Was this translation helpful? Give feedback.
-
|
Is this redundant/conflicting with |
Beta Was this translation helpful? Give feedback.
-
|
The documentation for this feature says:
However, from my Renovate debug output, it looks like it does indeed trigger the config effects of You can see that |
Beta Was this translation helpful? Give feedback.
-
|
Is there some possibility for more fine-grained control of automerge for vulnerabilityAlerts? E.g. automerge only on patch-level updateType? I have not managed to find any sort of packageRule with thich I could determine if an update is related to a vulnerabilityAlert. Am I missing something? Or maybe it's possible via matchJsonata? But then it's unclear what the object that I'm matching against even contains. Any ideas? |
Beta Was this translation helpful? Give feedback.
-
|
Hi, does anyone know if it's possible to configure Renovate to only make security PRs, but only for minor or patch updates? I tried using both the EDIT: Sorry forgot to mention, but I'm using self-hosted GitLab community edition, not GitHub. |
Beta Was this translation helpful? Give feedback.


Uh oh!
There was an error while loading. Please reload this page.
Uh oh!
There was an error while loading. Please reload this page.
-
Tell us how you like the new
osvVulnerabilityAlertsexperimental feature. What works for you, what doesn't work for you? Do you see anything we could improve?Let us know what you think! 😉
Beta Was this translation helpful? Give feedback.
All reactions