tree: a03c85021cc290c5dc1dc59adbcfdc6cb04b3837 [path history] [tgz]
  1. log/
  2. static/
  3. store/
  4. testdata/
  5. config.go
  6. false_positive_records.gen.go
  7. false_positives.go
  8. false_positives_test.go
  9. gen_false_positives.go
  10. README.md
  11. server.go
  12. server_test.go
  13. update.go
  14. update_test.go
  15. util.go
  16. worker.go
  17. worker_test.go
internal/worker/README.md

Go Vulnerability Worker

The vuln worker triages incoming security advisories and scans selected modules for vulnerabilities.

The Go security team runs the worker on Google Cloud Platform‘s Cloud Run product. See the repo’s terraform directory for more on the deployment setup.

The main program for the worker, in the repo‘s cmd/worker directory, can also be used as a command-line tool for one-off executions of some of the server’s actions.

Browsing the worker

Accessing the worker server's home page from a browser requires authentication. We recommend cloud-run-proxy for painless browsing. Install it with

go install github.com/GoogleCloudPlatform/cloud-run-proxy@latest

Run it from the repo root with

./devtools/proxy_worker.sh prod