Skip to main content

End-to-end SBOM generation and vulnerability intelligence pipeline

Project description

sbom-sentinel

CI PyPI

SBOM generation and vulnerability intelligence pipeline.

Wraps Syft and Grype behind a five-command CLI, enriches results with the CISA Known Exploited Vulnerabilities (KEV) catalog, and produces a timestamped Markdown report.

Installation

Requires Syft and Grype on PATH.

pip install sbom-sentinel

Quick Start

Run the full pipeline (SBOM + scan + report) in one command:

sbom-sentinel run --target ./myapp --name myapp --fail-on high
sbom-sentinel run --target docker:nginx:latest --name nginx --fail-on high
sbom-sentinel run --target https://github.com/org/repo --name repo --fail-on high

Or run each stage individually:

sbom-sentinel sbom --target ./myapp --name myapp
sbom-sentinel scan --sbom sbom_output/myapp_*.spdx.json --name myapp --fail-on high
sbom-sentinel report --scan artifacts/json/myapp_*.json --name myapp

Generate an HTML report instead of Markdown:

sbom-sentinel run --target ./myapp --name myapp --report-format html

Compare two scans to see what changed:

sbom-sentinel diff --old artifacts/json/myapp_old.json --new artifacts/json/myapp_new.json --name myapp

Features

  • SPDX-JSON SBOMs from local directories, container images, or Git URLs
  • Vulnerability scanning via Grype with severity gating (--fail-on)
  • CISA KEV enrichment with date-stamped local cache
  • OpenVEX / CSAF suppression with KEV conflict detection
  • Markdown or standalone HTML reports
  • JSON or SARIF scan output for GitHub Code Scanning
  • Verbose mode (-v) for diagnostic output

Commands

Command Description
sbom Generate an SPDX-JSON SBOM via Syft
scan Scan an SBOM for vulnerabilities via Grype
report Generate a Markdown or HTML report with KEV enrichment
diff Compare two scans and report new / resolved CVEs
run Run the full pipeline (sbom + scan + report, or scan + report from an existing SBOM)

Pass --help to any command for the full option reference.

VEX suppression

Pass an OpenVEX or CSAF document to suppress findings marked not_affected. Any suppressed CVE that also appears in CISA KEV is flagged as a conflict requiring manual review.

sbom-sentinel run --sbom sbom.spdx.json --name myapp --vex statements.vex.json

Exit Codes

Code Meaning
0 Success
1 Runtime error -- tool not found, scan threshold met, timeout, or parse failure
2 Usage error -- missing required option or invalid argument

Development

git clone https://github.com/Dashtid/sbom-sentinel.git
cd sbom-sentinel
uv sync
uv run pytest
uv run ruff check .
uv run mypy sbom_sentinel

See CONTRIBUTING.md for full guidelines.

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

sbom_sentinel-1.0.2.tar.gz (71.0 kB view details)

Uploaded Source

Built Distribution

If you're not sure about the file name format, learn more about wheel file names.

sbom_sentinel-1.0.2-py3-none-any.whl (23.9 kB view details)

Uploaded Python 3

File details

Details for the file sbom_sentinel-1.0.2.tar.gz.

File metadata

  • Download URL: sbom_sentinel-1.0.2.tar.gz
  • Upload date:
  • Size: 71.0 kB
  • Tags: Source
  • Uploaded using Trusted Publishing? Yes
  • Uploaded via: uv/0.11.7 {"installer":{"name":"uv","version":"0.11.7","subcommand":["publish"]},"python":null,"implementation":{"name":null,"version":null},"distro":{"name":"Ubuntu","version":"24.04","id":"noble","libc":null},"system":{"name":null,"release":null},"cpu":null,"openssl_version":null,"setuptools_version":null,"rustc_version":null,"ci":true}

File hashes

Hashes for sbom_sentinel-1.0.2.tar.gz
Algorithm Hash digest
SHA256 71bc4470ae0b8a7433f5355ddb91f0d65bf2c2107cf0cb3f35d6c40d66d1be67
MD5 6da2e9ac34715146acafbc61fe17ef49
BLAKE2b-256 c27bc0de66aa57242c0991eb7fceefa71eba3dd45ffb8ad617db5e743bdfdeef

See more details on using hashes here.

File details

Details for the file sbom_sentinel-1.0.2-py3-none-any.whl.

File metadata

  • Download URL: sbom_sentinel-1.0.2-py3-none-any.whl
  • Upload date:
  • Size: 23.9 kB
  • Tags: Python 3
  • Uploaded using Trusted Publishing? Yes
  • Uploaded via: uv/0.11.7 {"installer":{"name":"uv","version":"0.11.7","subcommand":["publish"]},"python":null,"implementation":{"name":null,"version":null},"distro":{"name":"Ubuntu","version":"24.04","id":"noble","libc":null},"system":{"name":null,"release":null},"cpu":null,"openssl_version":null,"setuptools_version":null,"rustc_version":null,"ci":true}

File hashes

Hashes for sbom_sentinel-1.0.2-py3-none-any.whl
Algorithm Hash digest
SHA256 719fcbeebd4468d6be1ad6f83fecf9c086482722c043dd0da8a57da60b52d17b
MD5 76062e0109b0a721b154d8c1b252418d
BLAKE2b-256 a37b458f30460ac33e92846cd9c832219351c4e1eaffdc927e4e9acb2bea4692

See more details on using hashes here.

Supported by

AWS Cloud computing and Security Sponsor Datadog Monitoring Depot Continuous Integration Fastly CDN Google Download Analytics Pingdom Monitoring Sentry Error logging StatusPage Status page