Replies: 1 comment 2 replies
-
|
thanks for taking the time to start a discussion and suggesting an implementation. first, this can't be called a bug, it's a feature request. second, there's an existing discussion and POC here: #8644 so I'll be closing this one in favor of the existing discussion. |
Beta Was this translation helpful? Give feedback.
2 replies
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Uh oh!
There was an error while loading. Please reload this page.
Uh oh!
There was an error while loading. Please reload this page.
-
Description
When I run trivy on a minimal distroless container image produced with ubuntu's tool chisel (https://ubuntu.com/containers/chiseled). I get the following
warning:So even if vulnerabilities were present in the dependencies, we wouldn't see them.
Also the sbom cannot be created.
Desired Behavior
I think Trivy should read the manifest file that is written by chisel: https://documentation.ubuntu.com/chisel/en/latest/reference/manifest/
Anyway other tools like
docker scoutorsyfthave no issues with the image.Actual Behavior
Trivy outputs a warning and doesn't scan for vulnerabilities. The sbom doesn't contain the dependencies.
Microsoft offers pre-built dotnet chiseled images. They applied a temporary solution to make it work, see discussion on dotnet/dotnet-docker#5973.
We can implement that work-around as well, but if trivy would support the chisel manifest natively, we can avoid that extra complexity.
Reproduction Steps
Target
Container Image
Scanner
Vulnerability
Output Format
None
Mode
Standalone
Debug Output
Operating System
Ubuntu
Version
Checklist
trivy clean --allBeta Was this translation helpful? Give feedback.
All reactions