{"id":31654798,"url":"https://github.com/complianceascode/cvetool","last_synced_at":"2025-10-07T12:17:03.103Z","repository":{"id":315642788,"uuid":"1058817907","full_name":"ComplianceAsCode/cvetool","owner":"ComplianceAsCode","description":"Next Gen CVE scanning for Fedora-based distros.","archived":false,"fork":false,"pushed_at":"2025-09-29T23:57:29.000Z","size":20395,"stargazers_count":1,"open_issues_count":5,"forks_count":0,"subscribers_count":0,"default_branch":"main","last_synced_at":"2025-09-30T01:22:01.379Z","etag":null,"topics":[],"latest_commit_sha":null,"homepage":"","language":"Go","has_issues":true,"has_wiki":null,"has_pages":null,"mirror_url":null,"source_name":null,"license":"apache-2.0","status":null,"scm":"git","pull_requests_enabled":true,"icon_url":"https://github.com/ComplianceAsCode.png","metadata":{"files":{"readme":"README.md","changelog":null,"contributing":null,"funding":null,"license":"LICENSE","code_of_conduct":null,"threat_model":null,"audit":null,"citation":null,"codeowners":null,"security":null,"support":null,"governance":null,"roadmap":null,"authors":null,"dei":null,"publiccode":null,"codemeta":null,"zenodo":null,"notice":"NOTICE","maintainers":null,"copyright":null,"agents":null,"dco":"DCO","cla":null}},"created_at":"2025-09-17T15:33:23.000Z","updated_at":"2025-09-29T23:56:12.000Z","dependencies_parsed_at":"2025-09-19T21:38:05.609Z","dependency_job_id":null,"html_url":"https://github.com/ComplianceAsCode/cvetool","commit_stats":null,"previous_names":["complianceascode/cvetool"],"tags_count":0,"template":false,"template_full_name":null,"purl":"pkg:github/ComplianceAsCode/cvetool","repository_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/ComplianceAsCode%2Fcvetool","tags_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/ComplianceAsCode%2Fcvetool/tags","releases_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/ComplianceAsCode%2Fcvetool/releases","manifests_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/ComplianceAsCode%2Fcvetool/manifests","owner_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners/ComplianceAsCode","download_url":"https://codeload.github.com/ComplianceAsCode/cvetool/tar.gz/refs/heads/main","sbom_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/ComplianceAsCode%2Fcvetool/sbom","scorecard":null,"host":{"name":"GitHub","url":"https://github.com","kind":"github","repositories_count":278773011,"owners_count":26043293,"icon_url":"https://github.com/github.png","version":null,"created_at":"2022-05-30T11:31:42.601Z","updated_at":"2022-07-04T15:15:14.044Z","status":"online","status_checked_at":"2025-10-07T02:00:06.786Z","response_time":59,"last_error":null,"robots_txt_status":"success","robots_txt_updated_at":"2025-07-24T06:49:26.215Z","robots_txt_url":"https://github.com/robots.txt","online":true,"can_crawl_api":true,"host_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub","repositories_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories","repository_names_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repository_names","owners_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners"}},"keywords":[],"created_at":"2025-10-07T12:16:59.589Z","updated_at":"2025-10-07T12:17:03.095Z","avatar_url":"https://github.com/ComplianceAsCode.png","language":"Go","readme":"# CVE Tool\n\nA [Claircore](https://github.com/quay/claircore)-based CVE manager (see also [clair-action](https://github.com/quay/clair-action/)).\n\n# Build\n\nInstall Go development tools and libraries (`goland`) and GNU `make`.\nRun \n```\n$ make build\n```\nto build the CLI tool.\n\n# Run\n\n## Update (or Initialize) the Database\n\nIn order to use the tool for CVE analysis and report generation first the CVE database must be initialized \nand filled with CVE records.\n\nRun\n```\n$ ./cvetool update --db-path=./matcher.db\n```\nto create or update the DB (SQLite).\n\nThe `--db-path` argument is the path to the database location. \n\n\u003e [!IMPORTANT]\n\u003e If the parameter is omitted the tool creates ephemeral (in-memory) database, which will be discarded after the tool finishes its job.\n\nThe initial update procedure could take up to 30 minutes. Further incremental updates will be significantly faster.\n\n## Scan Local System\n\nRun\n```\n$ ./cvetool report --root-path=/ --db-path=./matcher.db\n```\nto scan the underlying system and generate vulnerabilities report.\n\nThe `--root-path` argument defines root directory of the target file system.\n\n\u003e [!CAUTION]\n\u003e Currently the tool fails if there is a problem with accessing files (https://github.com/ComplianceAsCode/cvetool/issues/9).\n\u003e **At this moment it is not possible to get a report for the local system**.\n\n## Scan a Container Image\n\nRun\n```\n$ ./cvetool report --image-path=./rhel-10-ubi.tar --db-path=./matcher.db\n```\nto scan a `podman/docker image save ...`-compatible `.tar` image and generate vulnerabilities report.\n\n\u003e [!CAUTION]\n\u003e Currently the tool fails to process contemporary images with `layer.tar` symlinks (https://github.com/ComplianceAsCode/cvetool/issues/18).\n\u003e **At this moment it is not possible to get a report for a container image**.\n\n## Scan a Remote Container Image\n\nRun\n```\n$ ./cvetool report --image-ref=registry.access.redhat.com/ubi10/ubi --db-path=./matcher.db\n```\nto pull and scan an image from a repository and generate vulnerabilities report.\n\n## Scan a Virtual Machine Image\n\nThe tool does not directly support indexing VM images. But it can work with a mounted file system, e.g. with `guestmount`.\n\nRun\n```\n$ mkdir -p ./rhel10-vm\n$ guestmount -a ~/.local/share/gnome-boxes/images/rhel10.0 -i --ro ./rhel10-vm\n$ ./cvetool report --root-path=./rhel10-vm --db-path=./matcher.db\n```\nto mount the file system, scan and generate vulnerabilities report.\n\n# Report Formats\n\nDefault report format is `plain`, which represents basic information about found vulnerabilities in a human-readable form.\nIt could be changed with the `--format` argument. Possible options are 'clair', 'quay' and 'sarif'.\n\n# Help\n\nRun the tool with `--help` argument for detailed information about invocation options.\n","funding_links":[],"categories":[],"sub_categories":[],"project_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2Fcomplianceascode%2Fcvetool","html_url":"https://awesome.ecosyste.ms/projects/github.com%2Fcomplianceascode%2Fcvetool","lists_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2Fcomplianceascode%2Fcvetool/lists"}