Why is Snyk Missing Base Image Vulnerabilities Found by JFrog?

0
10
Asked By TechSavvy123 On

I'm currently scanning our Docker images with Snyk, but we recently received a report from a customer who uses JFrog. Their scan detected medium and low vulnerabilities in the base image that our Snyk scan didn't catch. Although these vulnerabilities fall outside our SLA, it's concerning to not have complete information. I've tried adjusting the Snyk settings but haven't been able to replicate JFrog's findings. Are there any tips or tricks for using Snyk more effectively? We are currently working with the default security policy.

3 Answers

Answered By ImageGuru99 On

Different scanners use separate vulnerability databases, so it's possible that Snyk just isn't mapping certain items. Have you tried updating Snyk’s database? It might help you catch those vulnerabilities that JFrog is reporting.

ScanMaster1 -

I've noticed a similar issue! For example, our image scans label 'openssl/libssl3' as a dependency, but it seems Snyk only recognizes 'libssl3'. This little discrepancy could be the reason. Does that give you any ideas?

Answered By SecurityAnalyzer42 On

If the discrepancies continue, consider trying other tools like Grype or Trivy to cross-verify vulnerabilities. They can often highlight different issues that Snyk might miss.

Answered By DockerNinja88 On

You should double-check your Dockerfile. Are you using a multi-stage build? Also, make sure that the images being scanned from both tools actually match your 'FROM' directive, as that can affect results.

Related Questions

LEAVE A REPLY

Please enter your comment!
Please enter your name here

This site uses Akismet to reduce spam. Learn how your comment data is processed.