-
Notifications
You must be signed in to change notification settings - Fork 4
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Add Trivy SBOM scan for wave build containers #489
Comments
Likely this can be implemented following the same "pattern" for the build logs:
|
Depends on #602 |
Does this require a separate job or it can be done along with the scan? |
We can use existing scan job. |
like this
|
Nice. @ewels is what you were expecting by this? |
There are two main industry standards for SBOMs:
|
Can both of them be created with the same scan command? |
no we need to provide the specific format for it if we want SPDX, then we need two jobs there is PR which add support for security scan in SPDX, but i don't see it in the results examples:
|
correction: SPDX also contains vulnerabilities, but format is different:
|
Any idea what other services provide? eg. Docker / Quay etc? Could do worse than comparing ourselves against them. |
from @ewels
Seeing more and more people ask about SBOM documents for pipelines / containers (software bill of materials). It looks like Trivy can generate SBOMs. Is this something that we could get Wave to do automatically for every build? Then host it the same way that we do for the security scan results?
https://www.aquasec.com/blog/software-supply-chain-security-trivy-sbom/
The text was updated successfully, but these errors were encountered: