Add analyzer for Chisel manifests #8644
Replies: 6 comments 1 reply
-
|
hi @zhijie-yang - thanks for the idea. We can keep this issue open to see the level of engagement and the desire of the community to have this. |
Beta Was this translation helpful? Give feedback.
-
|
Thanks for this! It would indeed be great to have. |
Beta Was this translation helpful? Give feedback.
-
|
I think adding support for analyzing chisel manifests is good step towards having a better vulnerability disvovery in containers. |
Beta Was this translation helpful? Give feedback.
-
Adding my 👍 to add this support in Trivy 🙂 |
Beta Was this translation helpful? Give feedback.
-
|
@simar7 there are some upvotes for this feature. Do you have any updates on your side? Is there a certain criteria you'd like this topic to meet before moving forward to the implementation? |
Beta Was this translation helpful? Give feedback.
-
|
This would be incredibly useful for my team. |
Beta Was this translation helpful? Give feedback.
Uh oh!
There was an error while loading. Please reload this page.
-
Description
Rationale
As there is a continuously increasing number of container images being built with
chisel(e.g., ubuntu/dotnet-runtime, ubuntu/jre, etc.), and that chiselled software package slices do not automatically amend to thedpkgmetadata in the container's rootfs (unless using achisel-wrapperexplicitly when building the image), supporting analyzing the vulnerabilities in the chiselled images is demonstrating its importance to ensure thorough scans against container images.Works done so far
@HadrienPatte has implemented the first draft for integrating the support for the chisel analyzer in their fork. I continue to work upon @HadrienPatte 's basis to make it work and finalized it in my fork on behave of Canonical.
Target
None
Scanner
Vulnerability
Beta Was this translation helpful? Give feedback.
All reactions