You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
I am working on using Trivy to scan Alpine-provided Go and Rust packages for vulnerabilities. This has already proven to be very useful, we have already mitigated a few CVEs that we had no visibility into.
However, the security team may choose to issue "true negative" secfixes data for some packages.
The problem is that Trivy does not consider OS-level security fix data when listing vulnerabilities in these binaries themselves. It would be nice to do so if the binary is "owned" by the package manager (/lib/apk/db/installed contains all the registered paths a package should have).
Would it be possible to correlate this data?
The text was updated successfully, but these errors were encountered:
I am working on using Trivy to scan Alpine-provided Go and Rust packages for vulnerabilities. This has already proven to be very useful, we have already mitigated a few CVEs that we had no visibility into.
However, the security team may choose to issue "true negative" secfixes data for some packages.
The problem is that Trivy does not consider OS-level security fix data when listing vulnerabilities in these binaries themselves. It would be nice to do so if the binary is "owned" by the package manager (
/lib/apk/db/installed
contains all the registered paths a package should have).Would it be possible to correlate this data?
The text was updated successfully, but these errors were encountered: