Independently-published VEX documents? #4468
Replies: 3 comments 11 replies
-
We're glad you contacted us because we were thinking of working with software maintainers to reduce the noise. And yes, VEX is a promising approach. However, PURL in VEX is unclear now, as we are discussing here. I feel like VEX needs to be coupled with SBOM to reduce ambiguity. Two considerations:
If it is a container image, there is a standardized way, OCI references, to get SBOM/VEX associated with the image. Trivy is also experimenting with the ability to upload attestations to Rekor for search. It is possible to find SBOM and VEX from binary digests. We are open to any suggestions you or Apache have. |
Beta Was this translation helpful? Give feedback.
-
Sure - I don't expect a quick fix, but would like to chart a longer-term plan.
Sure! For example, scanning the solr docker image at As another example, the airflow docker image at |
Beta Was this translation helpful? Give feedback.
-
Hi @raboof , we are close to releasing "VEX Hub" which is a central repository of VEX attestations. It will allow maintainers like you to easily publish VEX statements. It will be intergrated into Trivy for automatic discovery of relevant VEX Documents. This is pre-release but we will be happy to share with you details and get feedback, and also help you (or anyone else you recomment) help getting started. If it's relevant, please reach out to me at |
Beta Was this translation helpful? Give feedback.
-
Great to see you're also experimenting with VEX!
At Apache, we see downstream users use trivy to scan for vulnerabilities - which we encourage, as it's important for them to know when it is urgent to update or investigate potential security issues. However, such scans often produce many false positives, where dependencies are used in a way that does not surface the problems for which advisories may have been published.
VEX appears to be a promising approach to share (non)exploitability of dependency vulnerabilities in a machine-readable way, improving the accuracy of scan results. We would like to be able to publish this information in a way that doesn't just work with our own SBOMs, but also when using scanners like trivy.
CycloneDX appears difficult to use for this: the
affects.[].ref
fields can be a bom-ref (which I think needs to be in the same file) or BOM-Link (which references the SBOM's unique id, which we of course cannot predict).SPDX and OpenVEX seem a little more flexible, using purl, but there purl's ambiguity could be a challenge: if the sbom refers to a dependency as
pkg:deb/debian/[email protected]?arch=amd64&distro=debian-11.7
, it would be nice if a more generic pointer in the VEX such aspkg:deb/debian/[email protected]
or perhaps evenpkg:deb/debian/apt
would also be picked up. Even more tricky, essentially 'the same' software could be known under multiple purl types, for example both undergithub
and undermaven
.I'm curious about your thoughts on this use case!
Beta Was this translation helpful? Give feedback.
All reactions