Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

feat(spec): remove invocate in vuln predicate #2069

Closed

Conversation

masahiro331
Copy link
Contributor

Ref: #1381

Summar

Many vulnerability scanners are unaware of the type of environment in which they are used.

The consensus in some issues for this spec seemed to be to remove invocation.

Release Note

  • Remove invocation in vuln predicate.

Documentation

Need to fix the sample YAML.
https://docs.sigstore.dev/policy-controller/overview#configuring-policy-at-the-clusterimagepolicy-level

@masahiro331 masahiro331 force-pushed the feat/vuln_spec_remove_invocate branch from 254631b to 41d2694 Compare July 13, 2022 19:34
@masahiro331
Copy link
Contributor Author

masahiro331 commented Jul 15, 2022

@jdolitsky @dlorenc

My apologies to direct PR.

I wish to reopen and finalize the discussion against this specification.

@dlorenc
Copy link
Member

dlorenc commented Jul 16, 2022

@jdolitsky @dlorenc

My apologies to direct PR.

I wish to reopen and finalize the discussion against this specification.

Are you hoping to merge this?

@masahiro331
Copy link
Contributor Author

@dlorenc

Yes, I hope.

I'm a contributor to Trivy.
It is difficult to meet these specifications when supporting the intoto_attestation format as the output of Trivy's vulnerability detection results.

If supported, it must take environment information as an argument.

As another discussion, there is a question as to which one should be set if the job that runs Trivy is different from the job that runs cosign.

@masahiro331
Copy link
Contributor Author

Trivy's issue.
aquasecurity/trivy#1646

@masahiro331
Copy link
Contributor Author

masahiro331 commented Jul 21, 2022

@dlorenc

The discussion on Invocation had stopped, so I reopened via PR.

If possible, we would like to check if it is optional as well as scanner.db.
Currently, there is no specification for invocation, so we don't know if it is required.

@dlorenc
Copy link
Member

dlorenc commented Jul 23, 2022

Cc @puerco can you double check this one?

@puerco
Copy link
Member

puerco commented Jul 25, 2022

I don't want to revive what appears to be done discussion just because of it, but I actually think having the parameters of the scan captured in the invocation is useful. They may be optional if needed but their usefulness is there.

I feel there is value in capturing the parameters and environment in a standard way. While the scanning service can expose its inner state in its own output, I think we should capture those flags from outside of the scanner because of a) trust and b) because we cannot guarantee all scanner actually embed the data in their output.

Take for example these two examples. Running Trivy with and without --severity CRITICAL to scan the current alpine image gives me a total of

With --severity CRITICAL: 0 vulnerabilities
Without that same flag: 4 vulnerabilities

Yet, the output of the scan does not capture the runtime configuration, and even if it did, I think it is easier for a system replaying the attestation to read the invocation params and environment from a standard location.

@github-actions
Copy link

This PR is stale because it has been open 30 days with no activity. Remove stale label or comment or this will be closed in 10 days.

@github-actions
Copy link

github-actions bot commented Sep 4, 2022

This PR was closed because it has been stalled for 10 days with no activity.

@github-actions github-actions bot closed this Sep 4, 2022
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

Successfully merging this pull request may close these issues.

None yet

3 participants