Home etc Blogs Anchore’s Open Source Vulnerability Scanner Tool Integrated With GitLab 14

Anchore’s Open Source Vulnerability Scanner Tool Integrated With GitLab 14

0
815

Anchore announced that its open source Grype vulnerability scanner tool is now available in GitLab 14’s container scanning feature. Grype, leveraging Syft libraries, performs a deep inspection of container image contents to create an accurate software bill-of-materials (SBOM) and then produces high-fidelity vulnerability data that can be used to harden the software. This data can be used natively within GitLab workflows and interfaces.

The focus of the GitLab 14 release is to deliver a modern DevOps platform with increased velocity, trust and visibility. The integration of Grype enables security-minded engineers and developers to investigate and remediate vulnerability findings with analysis of the software package.

“We are excited to embed these robust container scanning features of Grype within GitLab’s complete DevOps platform. Our built-in security enables DevOps velocity with confidence and these added features from Anchore bring even greater security for cloud native applications,” said Sam White, Senior Product Manager at GitLab.

“Grype was selected for this integration based on its ease of use and accuracy of results. This is especially important as we see increased demand from software developers and engineers to protect against rising software supply chain attacks by embedding security early in the development process,” said Neil Levine, Vice President of Product at Anchore.

Grype provides the transparency and detail necessary to investigate why the image vulnerability is being reported. It allows user to quickly generate a list of known vulnerabilities that exist within a container image or project directory.As part of the integration with GitLab 14, users gain valuable information about the vulnerabilities discovered in order to empower users to triage and remediate them with available patches.

 

NO COMMENTS

LEAVE A REPLY

Please enter your comment!
Please enter your name here