Skip to content

Commit 5f9c9b9

Browse files
author
Johannes Spaeth
committed
adding disclaimer
1 parent 9c5c28a commit 5f9c9b9

File tree

1 file changed

+8
-1
lines changed

1 file changed

+8
-1
lines changed

README.md

Lines changed: 8 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -45,7 +45,6 @@ Java programs are frequently:
4545

4646
Consquently, _*any*_ library a Java project is using can include the vulnerability into your project. An in-depth bytecode analysis helps, which is what we publish as part of this repository.
4747

48-
4948
## How the script works
5049
1. Extract pom.xml files from .jar
5150
2. check declared dependencies against a [pre-computed list](src/main/resources/VulnerableGavs.csv) of affected groupId:artifactId:version list for artifacts hosten on Maven Central
@@ -59,6 +58,10 @@ To build this tool run
5958

6059
`mvn compile`
6160

61+
For assembling a runnable `jar` use
62+
63+
`mvn clean compile assembly:single`
64+
6265
## Precomputed Hashes of Vulnerable Classes
6366

6467
The set of vulnerable hashes for classes has been pre-compute on entire [Maven Central](https://mvnrepository.com/repos/central) repository. The hashes of the classes contain all hashes that we identified as bytecode-similiar using the Fingerprinting technology.
@@ -82,6 +85,10 @@ Details on the technology are found in the paper [SootDiff](https://dl.acm.org/d
8285

8386
*Note: For a simpler roll out, this repository does ship SHA hashes of the vulnerable classes, the information has been computed using Fingerprinting*
8487

88+
## Disclaimers
89+
90+
The list of hashes and maven artifacts is not complete. We'll regularly update the lists.
91+
8592
## Authors
8693

8794
* Andreas Dann <andreas.dann@codeshield.io>

0 commit comments

Comments
 (0)