-
Notifications
You must be signed in to change notification settings - Fork 2.4k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Enhancement request to support the Common Security Advisory Framework (CSAF) format. #1475
Comments
If I understand correctly, CSAF is similar to OVAL and CVRF and they are input for vulnerability detection. Is there any benefit to output the result in CSAF format? For example, Trivy consumes OVAL and CVRF, but it doesn't generate the result in those formats. |
Hi @knqyf263 , Thank you for looking into this and your reply! Yes indeed. CSAF is the replacement or successor of CVRF. In CSAF 2.0 we introduced the ability to map vulnerabilities with an SBOM. This is done by using a VEX profile. This profile is used to provide information of the "Vulnerability Exploitability eXchange". The main purpose of the VEX format is to state that and why a certain product is, or is not, affected by a vulnerability. This enhancement request is to have the ability to have Trivy provide a report of the vulnerabilities found after the scan in CSAF format. Thank you again! |
@santosomar Thanks for your explanation! Sounds interesting. We've added the task to our backlog and we welcome any contributions!! |
@knqyf263 are there any plans to tackle that backlog item? I have been checking this issue as our team is pretty interested in CSAF support and the main challenge I see seems to be the lack of golang libraries for CSAF (standard that is not particularly simple). I still could hack some silly (and invalid as per the above links from @tschmidtb51) filtering by just reusing OpenVEX's CSAF library. This is totally a quick hack and the wrong approach as OpenVEX is a totally different and unrelated VEX implementation and their CSAF support is mainly there to support filtering from
@santosomar any golang libraries coming at least for VEX support from CSAF community? |
@knqyf263, @mpermar, @shift: Please have a look at gocsaf/csaf#367 (comment) If you have specific request, what (else) would be needed for your use case, please add comments in gocsaf/csaf#367 |
The Common Security Advisory Framework Version 2.0 is now an approved specification in the industry. Details about the specification can be found at: https://csaf.io and https://docs.oasis-open.org/csaf/csaf/v2.0/cs01/csaf-v2.0-cs01.html
CSAF is a language to exchange Security Advisories formulated in JSON. CSAF v2.0 is the definitive reference for the language which supports creation, update, and interoperable exchange of security advisories as structured information on products, vulnerabilities and the status of impact and remediation among interested parties. It also supports "Vulnerability Exploitability eXchange" (VEX) profiles to associate security vulnerability advisories with software bill of materials (SBOMs). The SBOMs can be either in SPDX, CycloneDX, or SWID formats.
This issue is to humbly request the support of CSAF as an option for the output/report of the tool.
The text was updated successfully, but these errors were encountered: