Source: vuls Section: devel Priority: optional Maintainer: Debian Go Packaging Team Uploaders: Nobuhiro Iwamatsu , Build-Depends: debhelper-compat (= 13), dh-golang, golang-any, golang-github-asaskevich-govalidator-dev (>= 6), golang-github-aws-aws-sdk-go-dev, golang-github-azure-azure-sdk-for-go-dev, golang-github-boltdb-bolt-dev (>= 1.3.1), golang-github-burntsushi-toml-dev (>= 0.3.0), golang-github-cenkalti-backoff-dev (>= 1.1.0), golang-github-google-subcommands-dev, golang-github-gosuri-uitable-dev, golang-github-hashicorp-go-uuid-dev, golang-github-howeyc-gopass-dev, golang-github-jroimartin-gocui-dev (>= 0.3.0), golang-github-k0kubun-pp-dev, golang-github-knqyf263-go-cpe-dev, golang-github-knqyf263-go-deb-version-dev, golang-github-knqyf263-go-rpm-version-dev, golang-github-knqyf263-gost-dev (>= 0.1.0+git20181204.5afeda5e), golang-github-kotakanbe-go-cve-dictionary-dev (>= 0.3.1-3), golang-github-kotakanbe-go-pingscanner-dev (>= 0.1.0), golang-github-kotakanbe-goval-dictionary-dev, golang-github-kotakanbe-logrus-prefixed-formatter-dev, golang-github-mitchellh-go-homedir-dev, golang-github-mozqnet-go-exploitdb-dev, golang-github-nlopes-slack-dev (>= 0.1.0), golang-github-olekukonko-tablewriter-dev, golang-github-parnurzeal-gorequest-dev (>= 0.2.15), golang-github-racksec-srslog-dev, golang-github-rifflock-lfshook-dev (>= 1.7), golang-github-sirupsen-logrus-dev, golang-golang-x-crypto-dev, Standards-Version: 4.5.0 Homepage: https://github.com/future-architect/vuls Vcs-Browser: https://salsa.debian.org/go-team/packages/vuls Vcs-Git: https://salsa.debian.org/go-team/packages/vuls.git XS-Go-Import-Path: github.com/future-architect/vuls Rules-Requires-Root: no Testsuite: autopkgtest-pkg-go Package: vuls Architecture: any Built-Using: ${misc:Built-Using}, Depends: ${misc:Depends}, ${shlibs:Depends}, Description: Vulnerability scanner for Linux/FreeBSD, agentless, written in Go This is scanner which checks the package inventory against a local copy of the National Vunerabilities Database (NVD) of vulnerabilities according to their CVE (Common Vulnerabilities and Exposures) indentifiers. The backends supports a couple of OSs (Debian, RHEL, CentOS, Amazon Linux). Scanning servers over the network is possible.