menu
techminis

A naukri.com initiative

google-web-stories
Home

>

Devops News

>

Deep Dive ...
source image

Dev

2d

read

195

img
dot

Image Credit: Dev

Deep Dive 🤿: Where Does Grype Data Come From?

  • Grype is an open source vulnerability scanner for container images and filesystems.
  • The tool compares the software packages in an image against a database of known vulnerabilities.
  • Grype relies on upstream data providers to obtain vulnerability data.
  • The providers include Alpine, Amazon, Debian, GitHub Security Advisories, NVD, Oracle, RedHat, SLES, Ubuntu, and Wolfi.
  • Grype uses vunnel and grype-db open-source tools to build its vulnerability.db database.
  • The vulnerability.db file can be built manually if you want to use only a subset of upstream sources or create a custom database.
  • The file has five tables, but only two tables store significant data: vulnerability_metadata and vulnerability.
  • Ubuntu, NVD, and Susa have the most entries in the vulnerability_metadata table.
  • The data in the vulnerability.db file can be helpful in platform security and broader CVE trends analysis.
  • In conclusion, Grype's open data pipeline makes its vulnerability.db more flexible and useful.

Read Full Article

like

11 Likes

For uninterrupted reading, download the app