Skip to main content

Container Security Results Viewer

The Container scan results page shows info about the images identified in your project, the packages used in those images and the vulnerabilities associated with them.

The main screen shows a list of images grouped by the Dockerfile in which they were identified. For each image, info is shown about the related packages and vulnerabilities. There are also dashboard widgets showing key metrics for the selected Dockerfile.

Image_869.png

Click on an image to drill down to see detailed info about the packages and risks associated with that image.

Images and Layers Viewer

This pane contains two main sections, Images & Layers and Result Details.

Image & Layers Pane

This pane shows a separate section for each build stage showing all layers within that stage, as well as the ALL section that includes all layers. Next to each item, an icon indicates the overall risk level for that item.

This section serves as a navigation pane for the details tabs. When ALL is selected, all results are shown in the Vulnerabilities and Packages tabs. When a specific layer is selected, the Vulnerabilities and Packages tabs are filtered to show only results for that layer. The Remediation tab always shows recommendations for remediating the entire image.

Image_871.png

Malicious Packages

In addition to vulnerable packages, this scanner also identifies malicious packages.

When a malicious package is identified, that package is marked with a "malicious" icon.

This icon is shown in the main table next to both the malicious file and image. You can hover over the malicious icon next to the image to get more info about the risk.

Image_1222.png

You can drill down to see more details about the malicious image.

Image_1130.png

You can also set the filter to show only malicious packages.

Image_1131.png

Result Details Pane

The following sections describe the info shown in each of the tabs.

Vulnerabilities Tab

This tab shows the vulnerabilities identified in each package. Click on a package to show the associated vulnerabilities. Drill down further to see details about each vulnerability.

Notice

Use the search field at the top right to search by CVE or package name. Results are filtered as you type. You can also apply filters for State, Vulnerability Level, Malicious, Risk Score or Runtime Usage.

Image_872.png
Triaging Results

Important

The following permissions enable users to triage results:

  • update-result-state-not-exploitable (can change to this state only)

  • update-result-state-propose-not-exploitable (can change to this state only)

  • update-result-states (can change all states except not-exploitable; can’t change the severity)

  • update-result-severity (can change only severities)

For group related permissions, add "-if-in-group" the relevant permission, e.g., update-result-state-not-exploitable-if-in-group.

You can triage vulnerabilities by adjusting the Severity, State and risk Score of the vulnerability. Hover over a vulnerability and click on the Edit button. In the dialog that opens, you can click on the Severity, State or risk Score and select the value that you would like to assign. You can also add a note explaining the reasoning for the change. You can select different vulnerabilities within the same package and triage each of them.

Image_919.png
Bulk Action Triaging Results

You can triage multiple vulnerabilities with a single bulk action.

  1. In the Vulnerabilities tab, select the checkbox next to each vulnerability that you would like to include in the bulk action triage. Then, click on Edit Properties.

    Image_969.png

    All of the selected vulnerabilities are shown and you can click on each one to see the relevant details.

  2. Make changes to the Severity, State, and/or risk Score. The changes are applied to all of the selected vulnerabilities.

    Image_970.png

Packages Tab

This tab shows a list of packages that were identified. Click on a package to show detailed information about the package.

Notice

Use the search field at the top right to search by package name. Results are filtered as you type. You can also apply filters based on runtime usage and malicious packages.

Image_873.png

Remediation Tab

This tab shows info about recommended remediation actions. When you click on a base image in the navigation pane, a list of remediated versions of that image is displayed. The remediated versions are grouped by the type of version update (Next Remediated Versions, Remediated Major Versions, Remediated Minor Versions, Latest Remediated Versions, or Alternative Images). For each suggested version, the number of resolved vulnerabilities of each severity level is displayed. This enables users to choose the version that will most effectively remediate the vulnerabilities without requiring unnecessary code refactoring.

Image_918.png