Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Support VEX #46

Open
fabriziosestito opened this issue Nov 25, 2024 · 2 comments
Open

Support VEX #46

fabriziosestito opened this issue Nov 25, 2024 · 2 comments

Comments

@fabriziosestito
Copy link
Collaborator

fabriziosestito commented Nov 25, 2024

We want to support VEX (Vulnerability Exploitability Exchange) documents to filter or provide additional context to matches.

The user will be able to add VEX documents using a CRD, which will be used when scanning a SBOM manifest.
This is already supported by trivy and grype.

We need to understand how a user will configure a VEX document to be used against a certain set of images.
(will this be registry-based? global for all the registries in a namespace? should we implement filters by using image metadata?)

Moreover, the VulnerabilityReport generated should provide details about the VEX profile used to produce it.

@flavio
Copy link
Member

flavio commented Nov 25, 2024

Also, let's see how we can fetch data from trivy's Vex Hub

@macedogm
Copy link

macedogm commented Dec 16, 2024

Please consider supporting multiple VEX Hub entries, because we have our own in rancher/vexhub and it has VEXed entries that aren't sent to Trivy's VEX Hub. This happens, because we might VEX upstream CVEs in K8s and containerd, for example, that are applicable to our context in Rancher, but not generally applicable to contexts outside of it.

Note: VEX is now an integral part of Rancher, because only with it we can remove known-false positives. Only doing SBOM scan cannot remove such false-positives, because it checks only dependency and version combination, without doing a deeper scan of symbols that one can do with govulncheck (which is our main way to identify false-positives).

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

No branches or pull requests

3 participants