Replies: 1 comment 3 replies
-
Trivy supports SBOM discovery by leveraging the Referrers API. And we plan to expand the discovery to VEX. You don't need to build a new image. You can just attach VEX to your image in the OCI registry. Does it meet your requirements? |
Beta Was this translation helpful? Give feedback.
3 replies
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
-
Description
The container ecosystem would benefit from .trivyignore(.yml) files being evaluated centrally. At the moment it's not possible to maintain a platform with Harbor or trivy-operator that allows ignoring vulnerabilities per image. For Harbor only globally or per project. For the operator by asking admins to configure policy files per namespace/workload and maybe granting access to the values files containing them.
We need to support triaging in many teams with individual assessments of criticality, which can look different for each application deployed as an image. The teams shall be allowed to configure ignore files without asking admins to change configuration of the platform. Instead Trivy should read this information in a standardized way. In our minds that would be easiest by placing /.trivyignore(.yml) file in the root directory of an image as part of the build process. Trivy then reads this file regardless of instantiation in Harbor, the operator or other tooling integrating with Trivy to manage images.
Feature requests with individual suggestions were created already for those two tools:
aquasecurity/trivy-operator#1857
goharbor/harbor#19143
What do you think?
Target
Container Image
Scanner
Vulnerability
Beta Was this translation helpful? Give feedback.
All reactions