Skip to content

Bump the go_modules group across 1 directory with 2 updates#928

Open
dependabot[bot] wants to merge 1 commit intomasterfrom
dependabot/go_modules/go_modules-f9af3dc98c
Open

Bump the go_modules group across 1 directory with 2 updates#928
dependabot[bot] wants to merge 1 commit intomasterfrom
dependabot/go_modules/go_modules-f9af3dc98c

Conversation

@dependabot
Copy link
Copy Markdown
Contributor

@dependabot dependabot bot commented on behalf of github Mar 16, 2026

Bumps the go_modules group with 1 update in the / directory: github.com/google/osv-scalibr.

Updates github.com/google/osv-scalibr from 0.2.1 to 0.3.4

Release notes

Sourced from github.com/google/osv-scalibr's releases.

v0.3.4

  • New secret detectors: DigitalOcean API keys, OpenAI project keys, Tink plaintext keysets, GitLab PAT, HashiCorp Vault+App tokens, GitHub app refresh tokens
    • See the docs for an overview of all currently supported secret types.
  • Luarocks software extractor
  • Secret detection+validation can now be enabled individually with e.g. --plugins=secrets/gcpsak,secrets/gcpsakvalidate
  • Support fetching Maven dependencies from Artifact Registry
  • Improvements to semantic version comparison

v0.3.3

  • Vulnerability matching on Extracted packages with OSV.dev: Enable in the CLI with --plugins=vulnmatch/osvdev
  • Secret extractors with validation: Anthropic API keys, Perplexity API keys, Grok xAI API keys, Docker Hub PAT, private keys,
  • Inventory extractors: MacPorts, Winget, asdf package manager, Nimble
  • Vuln detectors: Docker Socket Exposure

Thanks to all Patch Reward Program participants for the new plugins!

If you're interested in contributing through the PRP yourself and earning rewards, check out https://bughunters.google.com/about/rules/open-source/6436351477940224/osv-scalibr-patch-rewards-program-rules

v0.3.2

  • New plugins: Dockerfile base images, network ports for MacOS, EoL linux distros, transitive requirements.txt dependencies, VEXing for DPKG packages without any binaries, software licenses
  • Additional binary types supported by the unknown binary extractor
  • CLI flag for scanning a local docker image
  • Annotation for NPM packages that are actually installed from NPM repositories
  • Support more ecosystems for version comparison

v0.3.1

  • Annotation for language packages already found by OS package for RPM, COS, APK
  • npm-shrinkwrap.json extraction
  • Secret scanning, supporting detection of GCP Service Account keys
  • Reachability analysis for Java
  • VEX annotation to mark false positive vulnerabilities
  • Unknown binary identification
  • CLI changes: --plugins= as a unified plugin enablement method
  • New Finding Format

v0.3.0

  • New CLI flags: --version, --cdx-component-type
  • New Plugins: Annotation for language packages already found by OS package for DPKG, transitive requirements.txt extraction
  • Potentially breaking API changes: Moved ToPURL, Ecosystem from Extractor to Package, changed Package.Extractor to Package.Plugins
  • Switched to cgo-less SQLite driver to avoid dependency on C code
  • Support for Extractors that run on whole directories instead of individual files
Commits
  • 8930967 Bump SCALIBR version to 0.3.4 in preparation for a new release.
  • 7fe1be3 Merge pull request #1376 from ackama:lint/iotamixing
  • ecec01c Merge pull request #1374 from ackama:semantic/reuse-helper
  • 1645031 Merge pull request #1377 from ackama:lint/cleanup-docs
  • f4852e8 Remove contributor stat posting from the PRP automation script
  • 227a03a chore: make godoc comments more consistent
  • 16775da refactor: put non-iota const in its own block
  • ffcac96 refactor(semantic): reuse existing function rather than regex for checking di...
  • bcadd5b Merge pull request #1335 from doyensec:veles-secrets-github-app-refresh-tokens
  • 5312e19 edit: remove secret detection bypass
  • Additional commits viewable in compare view

Updates github.com/opencontainers/selinux from 1.11.0 to 1.12.0

Release notes

Sourced from github.com/opencontainers/selinux's releases.

v1.12.0

This release removes deprecated functions from the label package, and improves documentation and error reporting of SetCreateKey.

What's Changed

Full Changelog: opencontainers/selinux@v1.11.1...v1.12.0

v1.11.1

What's Changed

New Contributors

Full Changelog: opencontainers/selinux@v1.11.0...v1.11.1

Commits
  • 996c4cf Merge pull request #227 from kolyshkin/fix-flake
  • 2a69eaf ci: add tests to check for races
  • 965323e SetKeyLabel: add thread group leader requirement
  • 4c76c01 TestSocketLabel: use LockOSThread to avoid flakes
  • 13b180a TestSELinux: use LockOSThread to avoid flakes
  • 03cde75 Merge pull request #228 from kolyshkin/label-rm-depr
  • 6f9de93 label: remove deprecated stuff
  • 931542d label: stop using deprecated stuff in tests
  • 21fd359 Merge pull request #218 from kolyshkin/ci-bumps
  • 346dfb5 Merge pull request #223 from AkihiroSuda/vm
  • Additional commits viewable in compare view

Dependabot will resolve any conflicts with this PR as long as you don't alter it yourself. You can also trigger a rebase manually by commenting @dependabot rebase.


Dependabot commands and options

You can trigger Dependabot actions by commenting on this PR:

  • @dependabot rebase will rebase this PR
  • @dependabot recreate will recreate this PR, overwriting any edits that have been made to it
  • @dependabot show <dependency name> ignore conditions will show all of the ignore conditions of the specified dependency
  • @dependabot ignore <dependency name> major version will close this group update PR and stop Dependabot creating any more for the specific dependency's major version (unless you unignore this specific dependency's major version or upgrade to it yourself)
  • @dependabot ignore <dependency name> minor version will close this group update PR and stop Dependabot creating any more for the specific dependency's minor version (unless you unignore this specific dependency's minor version or upgrade to it yourself)
  • @dependabot ignore <dependency name> will close this group update PR and stop Dependabot creating any more for the specific dependency (unless you unignore this specific dependency or upgrade to it yourself)
  • @dependabot unignore <dependency name> will remove all of the ignore conditions of the specified dependency
  • @dependabot unignore <dependency name> <ignore condition> will remove the ignore condition of the specified dependency and ignore conditions
    You can disable automated security fix PRs for this repo from the Security Alerts page.

Bumps the go_modules group with 1 update in the / directory: [github.com/google/osv-scalibr](https://github.com/google/osv-scalibr).


Updates `github.com/google/osv-scalibr` from 0.2.1 to 0.3.4
- [Release notes](https://github.com/google/osv-scalibr/releases)
- [Commits](google/osv-scalibr@v0.2.1...v0.3.4)

Updates `github.com/opencontainers/selinux` from 1.11.0 to 1.12.0
- [Release notes](https://github.com/opencontainers/selinux/releases)
- [Commits](opencontainers/selinux@v1.11.0...v1.12.0)

---
updated-dependencies:
- dependency-name: github.com/google/osv-scalibr
  dependency-version: 0.3.4
  dependency-type: direct:production
  dependency-group: go_modules
- dependency-name: github.com/opencontainers/selinux
  dependency-version: 1.12.0
  dependency-type: indirect
  dependency-group: go_modules
...

Signed-off-by: dependabot[bot] <support@github.com>
@dependabot dependabot bot added the dependencies Pull requests that update a dependency file label Mar 16, 2026
@google-oss-prow
Copy link
Copy Markdown

[APPROVALNOTIFIER] This PR is NOT APPROVED

This pull-request has been approved by: dependabot[bot]
Once this PR has been reviewed and has the lgtm label, please assign ekremenetskii for approval. For more information see the Kubernetes Code Review Process.

The full list of commands accepted by this bot can be found here.

Details Needs approval from an approver in each of these files:

Approvers can indicate their approval by writing /approve in a comment
Approvers can cancel approval by writing /approve cancel in a comment

@google-oss-prow
Copy link
Copy Markdown

Hi @dependabot[bot]. Thanks for your PR.

I'm waiting for a GoogleCloudPlatform member to verify that this patch is reasonable to test. If it is, they should reply with /ok-to-test on its own line. Until that is done, I will not automatically test new commits in this PR, but the usual testing commands by org members will still work. Regular contributors should join the org to skip this step.

Once the patch is verified, the new status will be reflected by the ok-to-test label.

I understand the commands that are listed here.

Details

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository.

@burov
Copy link
Copy Markdown
Member

burov commented Mar 17, 2026

/gcbrun

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

dependencies Pull requests that update a dependency file needs-ok-to-test size/L

Projects

None yet

Development

Successfully merging this pull request may close these issues.

1 participant