https://github.com/khulnasoft-lab/vulnstick
https://github.com/khulnasoft-lab/vulnstick
Last synced: about 2 months ago
JSON representation
- Host: GitHub
- URL: https://github.com/khulnasoft-lab/vulnstick
- Owner: khulnasoft-lab
- License: apache-2.0
- Created: 2024-04-27T16:26:58.000Z (about 1 year ago)
- Default Branch: main
- Last Pushed: 2025-03-04T19:45:26.000Z (3 months ago)
- Last Synced: 2025-03-04T20:33:31.965Z (3 months ago)
- Language: Python
- Size: 179 KB
- Stars: 0
- Watchers: 1
- Forks: 2
- Open Issues: 23
-
Metadata Files:
- Readme: README.md
- Contributing: CONTRIBUTING.md
- License: LICENSE
Awesome Lists containing this project
README
# vulnstick
A tool that can parse and compare the results of vulnerability scanner tools.
Manage and explore scan results:
```
# capture a new scan result for a specific tool and image
vulnstick result capture --image ubuntu:20.04 -t [email protected]# list all scan results that have been captured
vulnstick result list# explore the scan results interactively
vulnstick result explore
```Manage true positive / false positive labels for images:
```
# explore labels applied to specific scan-result matches for an image and tool pair
vulnstick label explore# list all managed labels
vulnstick label list
```Supported scanners:
- `grype`
- `syft`### F.A.Q.
*"Why is syft on this list? It's not a vulnerability scanner!"*
Right you are, however, capturing SBOM results that can be fed into grype or for
reference during analysis is quite useful!*"Vulnstick doesn't support vulnerability scanner X..."*
PR's are welcome! The goal of this tool is to provide the analysis capabilities
to understand how we can make these scanners better.## Result Sets
Result sets can be useful to operate on and track results from scans taken at the same time. For instance:
```yaml
# .vulnstick.yaml
result-sets:
example:
matrix:
images:
- ubuntu:20.04
tools:
- name: grype
version: v0.32.0
- name: grype
version: v0.48.0
``````bash
# capture results for all tools
$ vulnstick result capture -r example# see the specific result details
$ vulnstick result list -r example# perform a label comparison using all tooling
$ vulnstick label compare -r example
```## Configuration
Sample application config:
```yaml
# .vulnstick.yamlx-ref:
images: &images
- docker.io/cloudbees/cloudbees-core-mm:2.346.4.1@sha256:b8ec61aad2f5f9be2dc9c68923eab1de0e8b026176093ad2e0742fca310bf3bfresult-sets:
pr-vs-latest:
description: "latest released grype vs grype from the current build"
matrix:
images: *images
tools:
- name: syft # go ahead and capture an SBOM each time to help analysis later
version: v0.54.0
produces: SBOM- name: grype # from the latest published github release
version: latest
takes: SBOM- name: grype:pr # from a local PR checkout install (feed via an environment variable)
version: env:CURRENT_GRYPE_COMMIT
takes: SBOM
```## CLI Commands
```
config show the application configlabel manage match labels
add add a match label indication for an image
apply see which labels apply to the given image and...
compare compare a scan result against labeled data
compare-by-ecosystem show TPs/FPs/Precision from label comparison...
explore interact with an label results for a single image...
images show all images derived from label data
list show all labels
remove remove a match label indication for an image
set-image-parent set the parent image for a given image
show-image-lineage show all parents and children for the given imageresult manage image scan results
capture capture all tool output for the given image
clear remove all results and result sets
compare show a comparison between tool output
explore interact with an image scan result
images list images in results
import import results for a tool that were run externally
list list stored results
sets list configured result sets
show show a the results for a single scan + tool
tools list tools in results
```