Replies: 3 comments
-
|
some additional consideration: if someone wants to create an [output plugins](https://aquasecurity.github.io/trivy/v0.50/docs/configuration/reporting/#plugin that operates on an SBOM, they can't as of today since the |
Beta Was this translation helpful? Give feedback.
-
|
I think you're confused with
|
Beta Was this translation helpful? Give feedback.
-
|
We realized after starting the implementation of this issue that treating SBOM generation the same as the existing scanners is indeed challenging. In particular, since SBOM is not a security issue (as I commented in the description), its handling does not align with that of other scanners. For example, there is the question of what to do with SBOM information in table displays, and in SARIF it isn’t included at all. The I originally created this Issue to gather feedback from the community, but since there were no specific requests or comments, I have decided to revert it back to a Discussion. Unless a good idea emerges to resolve these issues or there is strong motivation to proceed with this change, it is not planned to be implemented in the near future. |
Beta Was this translation helpful? Give feedback.
Uh oh!
There was an error while loading. Please reload this page.
-
Description
Currently, we have the
--scannersflag, which supports the following options: vuln, misconf, secret, and license. To align with this structure, I'm considering renaming the--list-all-pkgsflag to--scanners sbom.This proposed change aims to:
However, I have a concern: while vuln, misconf, secret, and license are directly tied to security issues, the Software Bill of Materials (SBOM) is not directly a security concern. It's more about transparency and understanding the components within a software. By grouping it under the --scanners flag, there might be a potential for confusion among users regarding its purpose.
I'd appreciate feedback from the community on this proposal.
Beta Was this translation helpful? Give feedback.
All reactions