-
Notifications
You must be signed in to change notification settings - Fork 29
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
cves
command detects incorrect version (0.0.0
) of a devDependency
for a Node-based image
#65
Comments
Hi again Pavel! Thanks for the detailed report. Any way we could check whats in the SBOM? |
Thank you for getting back so quickly Mike! I took a quick look into SBOMs. I extracted the SBOM from the annotations of the built image
Using
No other mentions as far as I can see. But when I generate a new SBOM for the image using docker scout CLI, this package does not show up anywhere
If I understood correctly, this could explain why I can't share the full sboms right now, anyone who could sign off on that is already on holidays 😃 🎄 Happy holidays! |
I'm no JS expert but AI tells me that this filepath Also in terms of the version |
👋 Hello Docker Scout team!
We have just found interesting behaviour when using
command: cves
on a Node-based image. FordevDependencies
Scout determines the used versions of the packages as0.0.0
.Of course this version is very low and a dependency is marked vulnerable to every vulnerability ever discovered in the package.
These dependencies are not actually present in the image.
This seems to only happen in github actions, not in CLI or docker desktop.
This seems to happen only when analyzing an image that has the sbom.
Example
We are using
concurrently
(npm) to run a couple of scripts in a local development environment. We are not using it in production.package.json
:This means
concurrently
is showing up in ouryarn.lock
concurrently
depends onshell-quote
, which had two critical vulnerabilities in pastIn our case
shell-quote
in our final image, it's only adevDependency
shell-quote
1.8.1
where both vulnerabilities are fixedSBOM?
Interestingly enough, this only happens with images that have been built with
sbom: true
(docker/build-push-action@v5
). If the image does not have the sbom attached, these dependencies do not show up in the output (correct).As a workaround I disabled SBOM generation in our build pipeline. This is not nice of course.
I remember reading somewhere that sbom generation differs between scout and buildkit, can this be related?
Happy to provide more info if needed. Please feel free to reach out!
The text was updated successfully, but these errors were encountered: