This repository was archived by the owner on Jan 3, 2023. It is now read-only.

Description
I think that following output is horribly confusing, because in this case neither CVE scan nor Standard compliance scan was performed.
[root@thinkpad ~]# oscapd-evaluate scan --no-cve-scan --no-standard-compliance --output output/
INFO:OpenSCAP Daemon one-off evaluator 0.1.7
INFO:Successfully imported 'docker' and 'Atomic.mount', container scanning enabled.
INFO:Evaluated EvaluationSpec, exit_code=0.
INFO:[100.00%] Scanned target 'localhost'
The only thing that has been done was that applicable CPEs were determined, but I will not say that the "target was scanned". I see determining CPEs as a special use-case, that has to be done before scan.
I know that technically it's a scan, because it uses oscap xccdf eval under the hood, but user doesn't have to know that.