From 107725579188b5b7a895fe2017c224d86ca2aeaa Mon Sep 17 00:00:00 2001 From: Noah Talerman <47070608+noahtalerman@users.noreply.github.com> Date: Thu, 16 May 2024 15:41:17 -0400 Subject: [PATCH] Vulnerability processing docs: Add VS Code extensions (#19070) - Document that Fleet now detects vulns on VS Code extensions --- docs/Using Fleet/Vulnerability-Processing.md | 1 + 1 file changed, 1 insertion(+) diff --git a/docs/Using Fleet/Vulnerability-Processing.md b/docs/Using Fleet/Vulnerability-Processing.md index dbefe9960b..1b7f986fa6 100644 --- a/docs/Using Fleet/Vulnerability-Processing.md +++ b/docs/Using Fleet/Vulnerability-Processing.md @@ -21,6 +21,7 @@ Fleet detects vulnerabilities for these software types: | Apps | ✅ | ✅ | ❌ | | Browser plugins | Chrome extensions, Firefox extensions | Chrome extensions, Firefox extensions | ❌ | | Packages | Python, Homebrew | Python, Atom, Chocolatey | Adhere to whatever is defined in the [OVAL definitions](https://github.com/fleetdm/nvd/blob/master/oval_sources.json), except for kernel vulnerabilities and vulnerabilities involving configuration files. Supported distributions: | +| IDE extensions | VS Code extensions | VS Code extensions | VS Code extensions | As of right now, only app names with all ASCII characters are supported. Apps with names featuring non-ASCII characters, such as Cyrillic, will not generate matches.