You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Run with csh
Fixed in Enable to detect vulnerabilities on FreeBSD #98
Now vuls execute commands without -o pipefail option on FreeBSD.
You don't need to create a user with bash login shell.
non-root privilege
There is no need to use root privilege user on FreeBSD servers.
Vuls can scan using non-root users on FreeBSD.
(root privilege is needed on Amazon, CentOS, RHEL, Ubuntu and Debian for now)
Vuls supports FreeBSD just now.
It is awesome. Very very thanks to the work!
I found 1 problem.
see following line.
DEBU[0000] SSH executed. cmd: set -o pipefail; uname, status: <nil>
This line is one of the debug log.
I think vuls assumes that target hosts shell is bash, but FreeBSD's shell is not bash.
So, on FreeBSD, you cannot use
-o pipefail
option.The text was updated successfully, but these errors were encountered: