Skip to content

Document status-quo of vulnerability tracking

Provide a documentation of the status quo of vulnerabilty tracking. Apart from the E2E test-case, the documentation should consist of:

  1. Motivation: What is the use-case of vulnerability tracking and what was the origin.
  2. How does it work: What are the components involved (with links to all related/relevant projects).
  3. Algorithms: What algorithms do we have and what are their differences.
  4. Hierarchy: Why are algorithms prioritized and what is the impact of this priotization.
Edited by Julian Thome