trivy scan prints different results on simultaneous scans #9687
Replies: 6 comments 7 replies
-
|
Hello @RomanenkoDenys Unfortunately, I don’t have access to these images. Regards, Dmitriy |
Beta Was this translation helpful? Give feedback.
-
|
Hello, Dmitriy
Docker Hub cannot work at the moment, can i get additional information for
you ? If you need, we can schedule meet.
If you have public docker registry, i can push images to them.
пн, 20 окт. 2025 г. в 07:50, DmitriyLewen ***@***.***>:
… Hello @RomanenkoDenys <https://github.com/RomanenkoDenys>
Thanks for your report!
Unfortunately, I don’t have access to these images.
Could you push them to a public repository so I can take a look?
Regards, Dmitriy
—
Reply to this email directly, view it on GitHub
<#9687 (comment)>,
or unsubscribe
<https://github.com/notifications/unsubscribe-auth/APVV47DCLTR2GUZRGZDGHTL3YRS2ZAVCNFSM6AAAAACJTFXCJSVHI2DSMVQWIX3LMV43URDJONRXK43TNFXW4Q3PNVWWK3TUHMYTINZSGU2TEOA>
.
You are receiving this because you were mentioned.Message ID:
***@***.***>
|
Beta Was this translation helpful? Give feedback.
-
|
Please use
***@***.***:f06408e2be680aa9e9526f498d8fa93f9e83da81248082e1fe3001318977c621
пн, 20 окт. 2025 г. в 11:46, DmitriyLewen ***@***.***>:
… You can use ghcr.io or wait for Docker to fix its problems.
—
Reply to this email directly, view it on GitHub
<#9687 (reply in thread)>,
or unsubscribe
<https://github.com/notifications/unsubscribe-auth/APVV47D3SEIWZBI4EJJK2QL3YSONBAVCNFSM6AAAAACJTFXCJSVHI2DSMVQWIX3LMV43URDJONRXK43TNFXW4Q3PNVWWK3TUHMYTINZSG4YTENY>
.
You are receiving this because you were mentioned.Message ID:
***@***.***>
|
Beta Was this translation helpful? Give feedback.
-
|
No, that's not mistake. It's like we store images in our registry. That's
simple copy of image and vex attestation image.
Scan results:
```
***@***.*** ~ trivy image
***@***.***:f06408e2be680aa9e9526f498d8fa93f9e83da81248082e1fe3001318977c621
2025-10-21T09:16:42+03:00 INFO [vuln] Vulnerability scanning is enabled
2025-10-21T09:16:42+03:00 INFO [secret] Secret scanning is enabled
2025-10-21T09:16:42+03:00 INFO [secret] If your scanning is slow, please
try '--scanners vuln' to disable secret scanning
2025-10-21T09:16:42+03:00 INFO [secret] Please see
https://trivy.dev/v0.67/docs/scanner/secret#recommendation for faster
secret detection
2025-10-21T09:16:43+03:00 INFO Number of language-specific files num=1
2025-10-21T09:16:43+03:00 INFO [gobinary] Detecting vulnerabilities...
Report Summary
┌────────────────────────┬──────────┬─────────────────┬─────────┐
│ Target │ Type │ Vulnerabilities │ Secrets │
├────────────────────────┼──────────┼─────────────────┼─────────┤
│ usr/bin/kube-apiserver │ gobinary │ 1 │ - │
└────────────────────────┴──────────┴─────────────────┴─────────┘
Legend:
- '-': Not scanned
- '0': Clean (no security findings detected)
usr/bin/kube-apiserver (gobinary)
Total: 1 (UNKNOWN: 0, LOW: 0, MEDIUM: 1, HIGH: 0, CRITICAL: 0)
┌────────────────────────────┬────────────────┬──────────┬──────────┬───────────────────┬───────────────┬──────────────────────────────────────────────────────┐
│ Library │ Vulnerability │ Severity │ Status │
Installed Version │ Fixed Version │ Title
│
├────────────────────────────┼────────────────┼──────────┼──────────┼───────────────────┼───────────────┼──────────────────────────────────────────────────────┤
│ gopkg.in/square/go-jose.v2 │ CVE-2024-28180 │ MEDIUM │ affected │
v2.6.0 │ │ jose-go: improper handling of highly
compressed data │
│ │ │ │ │
│ │ https://avd.aquasec.com/nvd/cve-2024-28180
│
└────────────────────────────┴────────────────┴──────────┴──────────┴───────────────────┴───────────────┴──────────────────────────────────────────────────────┘
***@***.*** ~ trivy image
***@***.***:f06408e2be680aa9e9526f498d8fa93f9e83da81248082e1fe3001318977c621
--vex=oci
2025-10-21T09:16:50+03:00 INFO [vuln] Vulnerability scanning is enabled
2025-10-21T09:16:50+03:00 INFO [secret] Secret scanning is enabled
2025-10-21T09:16:50+03:00 INFO [secret] If your scanning is slow, please
try '--scanners vuln' to disable secret scanning
2025-10-21T09:16:50+03:00 INFO [secret] Please see
https://trivy.dev/v0.67/docs/scanner/secret#recommendation for faster
secret detection
2025-10-21T09:16:51+03:00 INFO Number of language-specific files num=1
2025-10-21T09:16:51+03:00 INFO [gobinary] Detecting vulnerabilities...
2025-10-21T09:16:53+03:00 INFO Some vulnerabilities have been
ignored/suppressed. Use the "--show-suppressed" flag to display them.
Report Summary
┌────────────────────────┬──────────┬─────────────────┬─────────┐
│ Target │ Type │ Vulnerabilities │ Secrets │
├────────────────────────┼──────────┼─────────────────┼─────────┤
│ usr/bin/kube-apiserver │ gobinary │ 0 │ - │
└────────────────────────┴──────────┴─────────────────┴─────────┘
Legend:
- '-': Not scanned
- '0': Clean (no security findings detected)
```
вт, 21 окт. 2025 г. в 08:26, DmitriyLewen ***@***.***>:
… Please use
*@*.***:f06408e2be680aa9e9526f498d8fa93f9e83da81248082e1fe3001318977c621
Is this typo?
—
Reply to this email directly, view it on GitHub
<#9687 (reply in thread)>,
or unsubscribe
<https://github.com/notifications/unsubscribe-auth/APVV47ALHWTUAHJJWAADHXL3YW72HAVCNFSM6AAAAACJTFXCJSVHI2DSMVQWIX3LMV43URDJONRXK43TNFXW4Q3PNVWWK3TUHMYTINZTGYYTENI>
.
You are receiving this because you were mentioned.Message ID:
***@***.***>
|
Beta Was this translation helpful? Give feedback.
-
|
Sorry Dmitriy, i do not understand your question.
What image you need ?
The image we are scanning?
It's
***@***.***:f06408e2be680aa9e9526f498d8fa93f9e83da81248082e1fe3001318977c621
Vex attestation image ?
It's
ghcr.io/romanenkodenys/trivy-image:sha256-f06408e2be680aa9e9526f498d8fa93f9e83da81248082e1fe3001318977c621.att
All of them are public images.
WBR, Denis Romanenko
вт, 21 окт. 2025 г. в 09:42, DmitriyLewen ***@***.***>:
… I need the image itself.
Without it, I can't help you figure out why Trivy isn't applying Vex rules.
Docker has fixed their issues. You can push images to Dockerhub.
—
Reply to this email directly, view it on GitHub
<#9687 (reply in thread)>,
or unsubscribe
<https://github.com/notifications/unsubscribe-auth/APVV47AHMNZQLHPXFLHZNZL3YXIVVAVCNFSM6AAAAACJTFXCJSVHI2DSMVQWIX3LMV43URDJONRXK43TNFXW4Q3PNVWWK3TUHMYTINZTGY3DMNY>
.
You are receiving this because you were mentioned.Message ID:
***@***.***>
|
Beta Was this translation helpful? Give feedback.
-
|
Thanks, this will solve my problem |
Beta Was this translation helpful? Give feedback.
Uh oh!
There was an error while loading. Please reload this page.
-
Description
When i run trivy scan on image vex attestations randomly doesn't work.
Desired Behavior
Vex attestations should work any time.
Actual Behavior
two runs:
first:
second run:
So vex attestations randomly doesn't work.
Reproduction Steps
Target
Container Image
Scanner
Vulnerability
Output Format
Table
Mode
Standalone
Debug Output
Beta Was this translation helpful? Give feedback.
All reactions