Skip to content

advxrsary/vuln-scanner

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

21 Commits
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

vuln-scanner

Description

This is a command line interface tool based on the @anchore's grype. It scans SBOM file and reports the vulnerabilities found in the image. This tool has its benefits over grype. It is less resource intensive and has simple and easy to use interface.

Installation

$ git clone
$ cd vuln-scanner
$ go build -o vuln-scanner

Usage

$ ./vuln-scanner -h

Usage:
        ./vuln-scanner -f <bom> [-d <distro:version>] [-o <output>] [-s <severity>] [-j]
        Flags in square brackets are optional
Examples:
        JSON output:    ./vuln-scanner -f bom.json -d alpine:3.12.0 -s high -o output.txt -j
        TXT file:       ./vuln-scanner -f bom.json -d alpine:3.12.0 -o output.txt
        STD output:     ./vuln-scanner -f bom.json
Flags:
        -f  <bom>               - path to SBOM
        -d  <distro:version>    - distro and version (optional, default: centos:07)
        -o  <output>            - output filename (optional)
        -s  <severity>          - minimum severity (optional, default: high)
        -c                      - columnize standard output (optional)
        -of                     - only fixed (optional)
        -j                      - output to json (optional, requires -o)
        -p                      - dont show flag parameters (optional)
        -h                      - help

Example

$ ./vuln-scanner -f bom.json -d alpine:3.12.0 -c -p
pkg=pkg:rpm/rsync@3.1.2-10.el7                         vuln=CVE-2022-29154  severity=High
pkg=pkg:rpm/kernel@3.10.0-1127.19.1.el7                vuln=CVE-2021-4083   severity=High
pkg=pkg:rpm/xz@5.2.2-1.el7                             vuln=CVE-2022-1271   severity=High
pkg=pkg:rpm/freetype@2.8-14.el7                        vuln=CVE-2020-15999  severity=High
...