Skip to main content

This packge parses the vulnerability report(.json) generated by trivy for container images, then generate human readable report(.html or .pdf)

Project description

ImageVulnAnalyzer

This tool can parse the raw vulnerabilities report of container image generated by trivy and generate a human-readable HTML page.

Installation

pip install iv_sherlock

Use the tool

This tool comes with a default config.toml, it's designed for running in linux OS.

[report]
# directory to put raw report generated by trivy
source_path = "/tmp/iv_sherlock/data"

# direcotry 
out_path = "/tmp/iv_sherlock/report"
default_encoding = "utf-8"
export_pdf = false

[cvss]
score_mapping = '{"AV": {"N": 0.85, "A": 0.62}, "AC": {"L": 0.77, "H": 0.44}, "PR": {"N": 0.85, "L": 0.62, "H": 0.27}, "UI": {"N": 0.85, "R": 0.62}, "S": {"U": 1.0, "C": 1.08}, "C": {"H": 0.56, "L": 0.22, "N": 0.0}, "I": {"H": 0.56, "L": 0.22, "N": 0.0}, "A": {"H": 0.56, "L": 0.22, "N": 0.0}}'

You can overload the default configuration file by using the -c or --conf option.

# run the application with default conf, only works in Linux OS
iv_sherlock

# run the application with custom conf
iv_sherlock -c path/to/custom_conf.toml

To generate some raw report for image in trivy, you can use the below command

$ trivy image -f json -o redis.json redis

You can have more details of trivy from here

The image vulnerabilities

The image vulnerabilities can be divided into two categories:

  • The vulnerabilities from base OS
  • The vulnerabilities from the applications (or dependencies of the application)

Rendering

The application will generate one report per image and one general report (summary) It is possible to get such a report in PDF too because it prints badly in browsers from HTML

To do that, install playwright and use :

playwright install

Otherwise, you can deactivate this functionality in the config.toml by setting export_pdf to false.

The app will run without playwright then

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

iv_sherlock-0.2.0.tar.gz (18.5 kB view details)

Uploaded Source

Built Distribution

If you're not sure about the file name format, learn more about wheel file names.

iv_sherlock-0.2.0-py3-none-any.whl (18.1 kB view details)

Uploaded Python 3

File details

Details for the file iv_sherlock-0.2.0.tar.gz.

File metadata

  • Download URL: iv_sherlock-0.2.0.tar.gz
  • Upload date:
  • Size: 18.5 kB
  • Tags: Source
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/6.1.0 CPython/3.11.10

File hashes

Hashes for iv_sherlock-0.2.0.tar.gz
Algorithm Hash digest
SHA256 c34d6e3a5fb0c00290c5936c9771831b89cffe0a9c763bbdfbe39bdd80bface7
MD5 3e1606c77aff88ab26a84ba2a77688a3
BLAKE2b-256 ef3455b8bd030267aa512cd77670020daa180239ac3d4ce8377ee4be5e16f173

See more details on using hashes here.

File details

Details for the file iv_sherlock-0.2.0-py3-none-any.whl.

File metadata

  • Download URL: iv_sherlock-0.2.0-py3-none-any.whl
  • Upload date:
  • Size: 18.1 kB
  • Tags: Python 3
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/6.1.0 CPython/3.11.10

File hashes

Hashes for iv_sherlock-0.2.0-py3-none-any.whl
Algorithm Hash digest
SHA256 5e33059dcffffbcfb26bf42425db5f6e7e6d46188989d02622f1001450544134
MD5 587c7a3bf218439ce82fa4da54482894
BLAKE2b-256 cebfb8569b5afb5795ed8d0e7df1585242d3b30dc323e16b0dcae6c8c4854497

See more details on using hashes here.

Supported by

AWS Cloud computing and Security Sponsor Datadog Monitoring Depot Continuous Integration Fastly CDN Google Download Analytics Pingdom Monitoring Sentry Error logging StatusPage Status page