Skip to main content

This packge parses the vulnerability report(.json) generated by trivy for container images, then generate human readable report(.html or .pdf)

Project description

ImageVulnAnalyzer

This tool can parse the raw vulnerabilities report of container image generated by trivy and generate a human-readable HTML page.

Installation

pip install iv_sherlock

Use the tool

This tool comes with a default config.toml, it's designed for running in linux OS.

[report]
# directory to put raw report generated by trivy
source_path = "/tmp/iv_sherlock/data"

# direcotry 
out_path = "/tmp/iv_sherlock/report"
default_encoding = "utf-8"
export_pdf = false

[cvss]
score_mapping = '{"AV": {"N": 0.85, "A": 0.62}, "AC": {"L": 0.77, "H": 0.44}, "PR": {"N": 0.85, "L": 0.62, "H": 0.27}, "UI": {"N": 0.85, "R": 0.62}, "S": {"U": 1.0, "C": 1.08}, "C": {"H": 0.56, "L": 0.22, "N": 0.0}, "I": {"H": 0.56, "L": 0.22, "N": 0.0}, "A": {"H": 0.56, "L": 0.22, "N": 0.0}}'

You can overload the default configuration file by using the -c or --conf option.

# run the application with default conf, only works in Linux OS
iv_sherlock

# run the application with custom conf
iv_sherlock -c path/to/custom_conf.toml

To generate some raw report for image in trivy, you can use the below command

$ trivy image -f json -o redis.json redis

You can have more details of trivy from here

The image vulnerabilities

The image vulnerabilities can be divided into two categories:

  • The vulnerabilities from base OS
  • The vulnerabilities from the applications (or dependencies of the application)

Rendering

The application will generate one report per image and one general report (summary) It is possible to get such a report in PDF too because it prints badly in browsers from HTML

To do that, install playwright and use :

playwright install

Otherwise, you can deactivate this functionality in the config.toml by setting export_pdf to false.

The app will run without playwright then

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

iv_sherlock-0.1.0.tar.gz (16.8 kB view details)

Uploaded Source

Built Distribution

If you're not sure about the file name format, learn more about wheel file names.

iv_sherlock-0.1.0-py3-none-any.whl (14.7 kB view details)

Uploaded Python 3

File details

Details for the file iv_sherlock-0.1.0.tar.gz.

File metadata

  • Download URL: iv_sherlock-0.1.0.tar.gz
  • Upload date:
  • Size: 16.8 kB
  • Tags: Source
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/6.1.0 CPython/3.11.10

File hashes

Hashes for iv_sherlock-0.1.0.tar.gz
Algorithm Hash digest
SHA256 4dbf598e542a7f968e3a01cf01e3bdbd2c0777cbc1fcdca6ff7d663187bf15d1
MD5 86d4d4ad5bc78d1769ad8c9865f52e19
BLAKE2b-256 aff71f7c331eeb241f28b02b8256fc00fdc848923166d690ca02201e9f19321f

See more details on using hashes here.

File details

Details for the file iv_sherlock-0.1.0-py3-none-any.whl.

File metadata

  • Download URL: iv_sherlock-0.1.0-py3-none-any.whl
  • Upload date:
  • Size: 14.7 kB
  • Tags: Python 3
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/6.1.0 CPython/3.11.10

File hashes

Hashes for iv_sherlock-0.1.0-py3-none-any.whl
Algorithm Hash digest
SHA256 7d66929865a00ce73fb0b5619d44d72f173c9e05ab140e070ed449b84d02c13d
MD5 eb815fe8227208ef32b82f45cfe8364c
BLAKE2b-256 68b9751e145c48618a9ff40d4422f30883da21b30a8202ecb0b3e7e2df96e0a6

See more details on using hashes here.

Supported by

AWS Cloud computing and Security Sponsor Datadog Monitoring Depot Continuous Integration Fastly CDN Google Download Analytics Pingdom Monitoring Sentry Error logging StatusPage Status page