Is there an existing issue for this?
Current Behavior
Running nuclei with -se filename.sarif generates a SARIF file.
Uploading the SARIF file to a GitHub repository works, but there isn't much information shown to the team.
After uploading the generated file to Microsoft's SARIF validator to see what is missing, the validator shows some failing validation rules.
Expected Behavior
Running nuclei with the -se filename.sarif option should generate a SARIF file that passes validation. This ensures that the findings in the SARIF file are easily readable after import (for example, in GitHub Advanced Security).
Steps To Reproduce
- Run
nuclei -u https://honey.scanme.sh --tags misconfig -se report.sarif
- Upload
report.sarif to the SARIF Validator
- Review findings
Relevant log output
Environment
- OS: MacOS 15.7.4
- Nuclei: v3.7.1 via homebrew
- Go:
Anything else?
I have PRs ready to fix this.
Is there an existing issue for this?
Current Behavior
Running nuclei with
-se filename.sarifgenerates a SARIF file.Uploading the SARIF file to a GitHub repository works, but there isn't much information shown to the team.
After uploading the generated file to Microsoft's SARIF validator to see what is missing, the validator shows some failing validation rules.
Expected Behavior
Running nuclei with the
-se filename.sarifoption should generate a SARIF file that passes validation. This ensures that the findings in the SARIF file are easily readable after import (for example, in GitHub Advanced Security).Steps To Reproduce
nuclei -u https://honey.scanme.sh --tags misconfig -se report.sarifreport.sarifto the SARIF ValidatorRelevant log output
Environment
Anything else?
I have PRs ready to fix this.