You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Trivy also supports [OpenVEX subcomponents][openvex-subcomponent], which allow for more precise specification of the scope of a VEX statement, reducing the risk of incorrect filtering.
176
+
Let's say you want to suppress vulnerabilities within a container image.
177
+
If you only specify the PURL of the container image as the product, the resulting VEX would look like this:
However, this approach would suppress all instances of CVE-2024-32002 within the container image.
198
+
If the intention is to declare that the `git` package distributed by Alpine Linux within this image is not affected, subcomponents can be utilized as follows:
By declaring the subcomponent in this manner, Trivy will filter the results, considering only the `git` package within the `ghcr.io/aquasecurity/trivy` container image as not affected.
224
+
Omitting the version in the PURL applies the statement to all versions of the package.
225
+
More details about PURL matching can be found [here](#purl-matching).
226
+
227
+
Furthermore, the product specified in a VEX statement does not necessarily need to be the target of the scan.
228
+
It is possible to specify a component that is included in the scan target as the product.
229
+
For example, you can designate a specific Go project as the product and its dependent modules as subcomponents.
230
+
231
+
In the following example, the VEX statement declares that the `github.com/docker/docker` module, which is a dependency of the `github.com/aquasecurity/trivy` Go project, is not affected by CVE-2024-29018.
Trivy also supports [CSAF relationships][csaf-relationship], reducing the risk of incorrect filtering.
408
+
It works in the same way as OpenVEX subcomponents.
409
+
At present, the specified relationship category is not taken into account and all the following categories are treated internally as "depends_on".
410
+
411
+
- default_component_of
412
+
- installed_on
413
+
- installed_with
414
+
316
415
### Scan with CSAF VEX
317
416
Provide the CSAF document when scanning your target.
318
417
319
-
```console
418
+
```bash
320
419
$ trivy image debian:11 --vex debian11.vex.csaf
321
420
...
322
421
2024-01-02T10:28:26.704+0100 INFO Filtered out the detected vulnerability {"VEX format": "CSAF", "vulnerability-id": "CVE-2019-8457", "status": "not_affected"}
0 commit comments