diff --git a/CHANGELOG.md b/CHANGELOG.md index 9448d38d6e..0bf565d2b0 100644 --- a/CHANGELOG.md +++ b/CHANGELOG.md @@ -5,7 +5,7 @@ **Merged pull requests:** -- Typo in Exapmle [\#6](https://github.com/future-architect/vuls/pull/6) ([toli](https://github.com/toli)) +- Typo in Example [\#6](https://github.com/future-architect/vuls/pull/6) ([toli](https://github.com/toli)) ## [v0.1.0](https://github.com/future-architect/vuls/tree/v0.1.0) (2016-04-04) **Merged pull requests:** diff --git a/README.md b/README.md index 5e506af05a..63b85e723b 100644 --- a/README.md +++ b/README.md @@ -24,7 +24,7 @@ To avoid downtime in production environment, it is common for system administrat This leads to the following problems. - System administrator will have to constantly watch out for any new vulnerabilities in NVD(National Vulnerability Database) and etc. - It might be impossible for the system administrator to monitor all the software if there are a large number of software installed in server. -- It is expensive to perform anaylsis to determine the servers affected by new vulnerabilities. The possibility of overlooking a server or two during analysis is there. +- It is expensive to perform analysis to determine the servers affected by new vulnerabilities. The possibility of overlooking a server or two during analysis is there. Vuls is a tool created to solve the problems listed above. It has the following characteristics. @@ -194,7 +194,7 @@ $ vuls prepare ``` $ vuls scan -INFO[0000] Begin scannig (config: /home/ec2-user/config.toml) +INFO[0000] Begin scanning (config: /home/ec2-user/config.toml) ... snip ... @@ -241,7 +241,7 @@ $ vuls tui ![Vuls-Architecture](img/vuls-architecture.png) ## go-cve-dictinary -- Fetch vulnerbility information from NVD, JVN(Japanese), then insert into SQLite. +- Fetch vulnerability information from NVD, JVN(Japanese), then insert into SQLite. ## Vuls - Scan vulnerabilities on the servers and create a list of the CVE ID @@ -280,7 +280,7 @@ web/app server in the same configuration under the load balancer # Usage: Automatic Server Discovery -Discovery subcommand discovers active servers specifed in CIDR range, then print the template of config file(TOML format) to terminal. +Discovery subcommand discovers active servers specified in CIDR range, then print the template of config file(TOML format) to terminal. ``` $ vuls discover -help @@ -448,7 +448,7 @@ prepare: -debug debug mode -use-unattended-upgrades - [Depricated] For Ubuntu, install unattended-upgrades + [Deprecated] For Ubuntu, install unattended-upgrades ``` ---- @@ -490,9 +490,9 @@ scan: -report-slack Slack report -use-unattended-upgrades - [Depricated] For Ubuntu. Scan by unattended-upgrades or not (use apt-get upgrade --dry-run by default) + [Deprecated] For Ubuntu. Scan by unattended-upgrades or not (use apt-get upgrade --dry-run by default) -use-yum-plugin-security - [Depricated] For CentOS 5. Scan by yum-plugin-security or not (use yum check-update by default) + [Deprecated] For CentOS 5. Scan by yum-plugin-security or not (use yum check-update by default) ``` @@ -588,7 +588,7 @@ If your system is behind HTTP proxy, you have to specify --http-proxy option. - How to Daemonize go-cve-dictionary Use Systemd, Upstart or supervisord, daemontools... -- How to update vulnerbility data automatically. +- How to update vulnerability data automatically. Use job scheduler like Cron (with -last2y option). - How to cross compile @@ -607,7 +607,7 @@ Run with --debug, --sql-debug option. [Riak docs](http://docs.basho.com/riak/latest/ops/tuning/open-files-limit/) is awesome. - Windows -Use Microsoft Baseline Secuirty Analyzer. [MBSA](https://technet.microsoft.com/en-us/security/cc184924.aspx) +Use Microsoft Baseline Security Analyzer. [MBSA](https://technet.microsoft.com/en-us/security/cc184924.aspx) ---- diff --git a/commands/scan.go b/commands/scan.go index 7e97ff7579..bf6a4fb268 100644 --- a/commands/scan.go +++ b/commands/scan.go @@ -130,7 +130,7 @@ func (p *ScanCmd) SetFlags(f *flag.FlagSet) { // Execute execute func (p *ScanCmd) Execute(_ context.Context, f *flag.FlagSet, _ ...interface{}) subcommands.ExitStatus { - logrus.Infof("Begin scannig (config: %s)", p.configPath) + logrus.Infof("Begin scanning (config: %s)", p.configPath) err := c.Load(p.configPath) if err != nil { logrus.Errorf("Error loading %s, %s", p.configPath, err)