Product Docs
-
-
-
-
-
- chainctl
- chainctl auth
- chainctl auth configure-docker
- chainctl auth login
- chainctl auth logout
- chainctl auth status
- chainctl auth token
- chainctl config
- chainctl config edit
- chainctl config reset
- chainctl config save
- chainctl config set
- chainctl config unset
- chainctl config validate
- chainctl config view
- chainctl events
- chainctl events subscriptions
- chainctl events subscriptions create
- chainctl events subscriptions delete
- chainctl events subscriptions list
- chainctl iam
- chainctl iam account-associations
- chainctl iam account-associations check
- chainctl iam account-associations check aws
- chainctl iam account-associations check gcp
- chainctl iam account-associations describe
- chainctl iam account-associations set
- chainctl iam account-associations set aws
- chainctl iam account-associations set gcp
- chainctl iam account-associations unset
- chainctl iam account-associations unset aws
- chainctl iam account-associations unset gcp
- chainctl iam folders
- chainctl iam folders delete
- chainctl iam folders describe
- chainctl iam folders list
- chainctl iam folders update
- chainctl iam identities
- chainctl iam identities create
- chainctl iam identities create github
- chainctl iam identities create gitlab
- chainctl iam identities delete
- chainctl iam identities describe
- chainctl iam identities list
- chainctl iam identities update
- chainctl iam identity-providers
- chainctl iam identity-providers create
- chainctl iam identity-providers delete
- chainctl iam identity-providers list
- chainctl iam identity-providers update
- chainctl iam invites
- chainctl iam invites create
- chainctl iam invites delete
- chainctl iam invites list
- chainctl iam organizations
- chainctl iam organizations delete
- chainctl iam organizations describe
- chainctl iam organizations list
- chainctl iam role-bindings
- chainctl iam role-bindings create
- chainctl iam role-bindings delete
- chainctl iam role-bindings list
- chainctl iam role-bindings update
- chainctl iam roles
- chainctl iam roles capabilities
- chainctl iam roles capabilities list
- chainctl iam roles create
- chainctl iam roles delete
- chainctl iam roles list
- chainctl iam roles update
- chainctl images
- chainctl images diff
- chainctl images list
- chainctl images repos
- chainctl images repos list
- chainctl update
- chainctl version
Open Source
Education
Using CVE Visualizations
CVE Visualizations provide insight into image health and can help teams measure the engineering, security, and economic benefits gained from using Chainguard Images. The feature creates reports with CVE comparisons between Chainguard Images and popular alternatives, as well as historical CVE remediation metrics.
NOTE: This is a beta feature and changes should be expected. In particular, we plan to add more metrics in the near future.
Accessing CVE Visualizations
Visualizations can be found under the Reports section on the left-hand navigation bar.
The reports page should look similar to the following:
The top left drop down in the main page is used to select the Chainguard image you want to compare. Once an image is selected, a second drop down will be populated with data on “alternative” images, if available. In some cases there will be more than one alternative available, in which case you can select between them using the drop down.
The period drop down is used to select a time-period for the report.
Below the controls, you will find several boxes with statistics and graphs:
- An overview section showing the current and average CVE counts as well as image size for the images.
- A “CVEs by Severity” section holding bar graphs with the CVE count per day for both images, broken down by severity. Any grey bars indicate we are missing data for that day.
- A “Total CVEs over time” section showing a line graph with the total number of CVEs for any given day for each image. This gives a simple visual comparison of the difference in CVE count between the images.
You will also see the same comparison data when navigating to a specific image in your Organization images, under the “Comparison” tab.
Limitations
We only have data for a limited subset of alternative images. We will expand this set over time, but please let us know of any particular comparison data you are looking for.
Learn More
The CVE data used in these reports is from the Grype vulnerability scanner. Vulnerability data is constantly evolving, so we scan images each day and store the results. The results shown are the vulnerabilities found on the day in question; scanning the images again with a newer database will show different results.
For more information on CVEs see What Are Software Vulnerabilities and CVEs.
Last updated: 2024-12-04 11:07
