Files
OSV-Scanner scans the following manifest and lock files:bun.lock,package-lock.json,pnpm-lock.yaml,yarn.lockrequirements.txt,Pipfile.lock,poetry.lock,pdm.lock,pylock.toml,uv.lockgo.modpom.xml,buildscript-gradle.lockfile,gradle.lockfile,gradle/verification-metadata.xmlGemfile.lock,gems.lockedcomposer.lockCargo.lockpubspec.lockmix.lockrenv.lockcabal.project.freeze,stack.yaml.lockconan.lockdeps.jsonpackages.lock.json,packages.config
Configuration
You can customize OSV-Scanner by adding an optionalosv-scanner.toml configuration file to your repository.
OSV-Scanner runs without a config file. If your repository contains an
osv-scanner.toml file, CodeRabbit uses it when running OSV-Scanner.Notes
- OSV-Scanner scans dependency manifest and lock files to identify known vulnerabilities.
- Findings include vulnerability severity scores and details from the OSV.dev database.
Profile behavior
- In Chill mode, CodeRabbit keeps only
highandcriticalfindings. - In Assertive mode, CodeRabbit reports findings across all severities.