OWASP dependency-check
Last updated
Was this helpful?
Last updated
Was this helpful?
Dependency-Check is a Software Composition Analysis (SCA) tool that attempts to detect publicly disclosed vulnerabilities contained within a project's dependencies. It does this by determining if there is a Common Platform Enumeration (CPE) identifier for a given dependency. If found, it will generate a report linking to the associated CVE entries.
Documentation and links to production binary releases can be found on the . Additionally, more information about the architecture and ways to extend dependency-check can be found on the .
8.0.0 contains breaking changes which requires updates to the database. If using an externally hosted database the schema will need to be updated. When using the embedded H2 database the schema should be upgraded automatically. However, if issues arise you may need to purge the database:
gradle: ./gradlew dependencyCheckPurge
maven: mvn org.owasp:dependency-check-maven:8.0.0:purge
cli: dependency-check.sh --purge
OWASP dependency-check requires access to several externally hosted resources. For more information see .
In order to analyze some technology stacks dependency-check may require other development tools to be installed. Some of the analysis listed below may be experimental and require the experimental analyzers to be enabled.
To analyze .NET Assemblies the dotnet 6 run time or SDK must be installed.
Assemblies targeting other run times can be analyzed - but 6 is required to run the analysis.
If analyzing GoLang projects go
must be installed.
The analysis of Elixir
projects requires mix_audit
.
The analysis of npm
, pnpm
, and yarn
projects requires npm
, pnpm
, or yarn
to be installed.
The analysis performed utilize the respective audit
feature of each.
The analysis of Ruby is a wrapper around bundle-audit
, which must be installed.
Downloading the latest release:
On *nix
On Windows
The dependency-check plugin can be configured using the following:
For installation to pass, you must have the following components installed:
Java: java -version
1.8
Maven: mvn -version
3.5.0 and higher
Tests cases require:
dotnet core version 6.0
Go: go version
1.12 and higher
The following instructions outline how to compile and use the current snapshot. While every intention is to maintain a stable snapshot it is recommended that the release versions listed above be used.
The repository has some large files due to test resources. The team has tried to clean up the history as much as possible. However, it is recommended that you perform a shallow clone to save yourself time:
On *nix
On Windows
Then load the resulting 'dependency-check-report.html' into your favorite browser.
To speed up your turnaround cycle times, you can also compile without running the tests each time:
mvn -s settings.xml install -DskipTests=true
Please remember to at least run the tests once before opening the PR. :)
To be able to debug your tests in IntelliJ Idea, you can introduce a maven configuration that executes your test and enables debugging with breakpoints etc.
Step by step:
Run -> Edit Configurations
+ (Add new configuration) -> Maven
Give the Configuration a name, e.g. Run tests
Choose working directory, e.g. core
In command line
, enter DforkCount=0 -f pom.xml -s ../settings.xml test
Press OK
Run -> Debug
, then choose the newly created run configuration
IntelliJ will now execute the test run for the core
subproject with enabled debugging. Breakpoints set anywhere in code should work.
If you would like to speed up your turnaround cycle times, you can also just test one function or one test class.
This works by adding -Dtest=MyTestClass
or -Dtest=MyTestClass#myTestFunction
to the run configuration. The complete command line in the run configuration then would be:
Dtest=MyTestClass#myTestFunction -DforkCount=0 -f pom.xml -s ../settings.xml test
In the following example it is assumed that the source to be checked is in the current working directory and the reports will be written to $(pwd)/odc-reports
. Persistent data and cache directories are used, allowing you to destroy the container after running.
For Linux:
For Windows:
To build dependency-check (using Java 8) run the command:
Dependency-check references several vulnerable dependencies that are never used except as test resources. All of these optional test dependencies are included in the test-dependencies
profile. To run dependency-check against itself simple exclude the test-dependencies
profile:
Once done, point your browser to ./target/staging/index.html
.
To build dependency-check docker image run the command:
Copyright (c) 2012-2023 Jeremy Long. All Rights Reserved.
For instructions on the use of the Jenkins plugin please see the .
More detailed instructions can be found on the . The latest CLI can be downloaded from github in the .
On Mac with Note - homebrew users upgrading from 5.x to 6.0.0 will need to run dependency-check.sh --purge
.
More detailed instructions can be found on the . By default, the plugin is tied to the verify
phase (i.e. mvn verify
). Alternatively, one can directly invoke the plugin via mvn org.owasp:dependency-check-maven:check
.
For instructions on the use of the Gradle Plugin, please see the .
For instructions on the use of the Ant Task, please see the .
Ruby
Basically, you do what´s described in and set the forkCount
to 0, otherwise debugging won´t work.
The documentation on the is generated from this repository:
Permission to modify and redistribute is granted under the terms of the Apache 2.0 license. See the file for the full license.
Dependency-Check makes use of several other open source libraries. Please see the file for more information.