Skip to content

Re-uploads the images which have expired or non-existing vulnerability scan results in AWS Inspector

License

Notifications You must be signed in to change notification settings

rootameen/ecr-rescanner

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

7 Commits
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

ECR Rescanner

ECR Rescanner targets users of AWS Elastic Container Registry (ECR) and AWS Inspector. Inspector currently has a limitation where only images uploaded up to 30 days before its activation to scan ECR images are scanned. ECR Rescanner reuploads the images which have expired or non-existing scan results, allowing for a more comprehensive security scan of your ECR repositories.

How it works

As of now, the only way to trigger a rescan of an image on ECR is to delete it and re-upload it again. This tool does that, by pulling the detected target images - ones that currently do not have scan results - to the local system, remove them from ECR, then re-upload them again to initiate their scan.

Usage

To use ECR Rescanner, you will need to have AWS credentials set up on your system. Once you have your credentials set up, you can run the following command to scan all images in your ECR repository:

ecr-rescanner -ecrProfile <profile-name> -ecrImageRegistry <registry-id> -mode <mode> -deleteLocal <true/false>

The -ecrProfile flag specifies the name of the AWS profile to use for authentication. -ecrImageRegistry sets the ECR Registry ID. The-mode flag specifies the mode of operation for the tool. The available modes are:

  • pull-only (default): only pulls the eligible images for rescanning to the local system
  • full-rescan: This mode pulls all eligible images in the repository, deletes them from ECR, then reuploads them again to initiate their scan

The -deleteLocal (bool) flag specifies whether to delete the local copy of the image after it has been uploaded to ECR.

About

Re-uploads the images which have expired or non-existing vulnerability scan results in AWS Inspector

Topics

Resources

License

Stars

Watchers

Forks

Packages

 
 
 

Languages