First Seen
Feb 18, 2026
Last Scanned
Feb 20, 2026
Findings
2
Score
100/100
Findings (2)
Detects git clone of repositories followed by execution of cloned content
git clone https://github.com/aquasecurity/trivy.git + cd backend && npm run Review the dependency tree for nested or transitive dependencies that introduce risk. Use tools like npm audit or pip-audit to identify known vulnerabilities in the dependency chain.
Likely FP if the flagged dependency is a standard, widely-used library with no known vulnerabilities at the time of scanning.
Detects global installation of packages which affects the host system
npm install -g s Replace npm install -g with a local install (npm install --save-dev) or use npx with a pinned version. Global installs modify the system and risk supply chain attacks.
Likely FP if the global install is for a well-known CLI tool (e.g., typescript, eslint) in setup documentation, though the supply chain risk remains real.