You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
What would you like to be added:
Syft currently inspects and surfaces a number of different packages inside a container given specific cataloger rules.
Some current vulnerability datasets mark the container itself as vulnerable with identifying purls going only as far as the metadata that's found in a docker inspect or skopeo inspect command:
Syft should start surfacing the scanned container as it's own package type in the final SBOM to help with matching against these kinds of vulnerability records.
Why is this needed:
Better cataloging of the actual images being scanned as the "root" or vulnerable node in an SBOM.
The text was updated successfully, but these errors were encountered:
What would you like to be added:
Syft currently inspects and surfaces a number of different packages inside a container given specific cataloger rules.
Some current vulnerability datasets mark the container itself as
vulnerable
with identifying purls going only as far as the metadata that's found in adocker inspect
orskopeo inspect
command:Syft should start surfacing the scanned container as it's own package type in the final SBOM to help with matching against these kinds of vulnerability records.
Why is this needed:
Better cataloging of the actual images being scanned as the "root" or vulnerable node in an SBOM.
The text was updated successfully, but these errors were encountered: