OSV.dev
OSV.dev is an open-source vulnerability database and API that helps developers find known vulnerabilities in open-source packages, commits, lockfiles, SBOMs, and container images.
What OSV.dev is
OSV.dev official site describes OSV as a distributed vulnerability database for open source. It collects vulnerability records from multiple ecosystems, presents them through a searchable website, and exposes an API for querying known vulnerabilities by package version or commit hash. The project is designed for dependency security work. Instead of treating every advisory as equally relevant, OSV focuses on precise affected-version data so developers and tools can decide whether a specific package, version, commit, lockfile, SBOM, or container image is affected.
Schema and data sources
OSV records use the OpenSSF OSV format, a structured data model for describing vulnerabilities in ways that map to open-source package ecosystems, versions, and commits. The homepage lists ecosystems such as npm, PyPI, Maven, Go, RubyGems, Packagist, crates.io, Debian, Ubuntu, Alpine, and more. The service acts as an aggregator for vulnerability databases that have adopted the format. That gives security tools a common way to read advisories from different communities without writing a custom parser for every source.
API and search workflows
OSV.dev provides an API for querying vulnerabilities by commit hash or package version. Developers can also search the website directly when they need to inspect a vulnerability entry, understand affected ranges, follow references, or compare advisories across ecosystems. The API matters because dependency checks often happen inside automation. Continuous integration, software composition analysis tools, build systems, and custom security scripts can query OSV data without requiring a human to browse each advisory manually.
OSV-Scanner and remediation
OSV-Scanner is the first-party tool that uses OSV.dev data. The official site shows workflows for scanning lockfiles, SBOMs, directories, container images, and GitHub workflows, plus guided remediation commands for some package-manager files. A scanner does not replace judgment. It narrows the field by identifying known vulnerabilities that match project dependencies, then maintainers still need to evaluate exploitability, upgrade paths, compatibility, and deployment risk.
Open-source infrastructure
The OSV.dev infrastructure is open source in the `google/osv.dev` repository. The documentation says the repository contains the infrastructure code that serves the website and API, and the homepage invites users to create issues for ideas or questions. That open development model is important for security infrastructure because data quality, schema choices, ecosystem coverage, and tooling behavior all affect how teams respond to vulnerability reports.
Who uses OSV.dev
OSV.dev is used by open-source maintainers, application security teams, dependency-management tools, CI/CD workflows, package ecosystem operators, software composition analysis vendors, developers reviewing upgrades, and researchers comparing vulnerability data across ecosystems.
Why it matters
Open-source security depends on accurate mapping between advisories and the exact versions or commits that are affected. OSV.dev matters because it gives ecosystems and tools a shared structure for that mapping, reducing noisy alerts and helping teams focus on vulnerabilities that actually touch their software. It also supports automation. A common API and schema let security checks happen earlier in development, in pull requests, scheduled scans, release pipelines, and container workflows.
WHOIS domain data
Data pulled: May 24, 2026View current WHOIS record
- Domain
- osv.dev
- WHOIS source note
- The Who.is WHOIS lookup did not expose a traditional WHOIS data table; the visible domain registration fields below are from the Who.is RDAP view for the same domain.
- IP address
- 34.49.235.131
- Registrar
- Markmonitor Inc.
- Registrar handle
- 292
- Contact URI
- https://www.markmonitor.com/contact-us/
- Created
- November 16, 2020
- Updated
- January 11, 2024
- RDAP database updated
- May 23, 2026
- Expires
- November 16, 2030
- Nameservers
- ns-cloud-a1.googledomains.com (216.239.32.106); ns-cloud-a2.googledomains.com (216.239.34.106); ns-cloud-a3.googledomains.com (216.239.36.106); ns-cloud-a4.googledomains.com (216.239.38.106)
- Domain status
- client delete prohibited, client transfer prohibited, client update prohibited
- Contact privacy
- The visible Who.is RDAP summary shows a domain contact URI at https://domains.markmonitor.com/whois/contact/osv.dev; registrant personal details are not displayed.