Skip to content

Commit a25eeca

Browse files
dhi: add scout result comparison (#23567)
<!--Delete sections as needed --> ## Description Some scanners report different results than Scout. Updated scan topic: - Added some results that may be different - Added links so users can see how to filter results with grype and trivy. ## Related issues or tickets ENGDOCS-3045 https://docker.slack.com/archives/C04M34MRQS1/p1759880139320619?thread_ts=1759851728.674399&cid=C04M34MRQS1 ## Reviews <!-- Notes for reviewers here --> <!-- List applicable reviews (optionally @tag reviewers) --> - [ ] Technical review - [ ] Editorial review - [ ] Product review Signed-off-by: Craig Osterhout <[email protected]>
1 parent b6d6f36 commit a25eeca

File tree

1 file changed

+20
-0
lines changed

1 file changed

+20
-0
lines changed

content/manuals/dhi/how-to/scan.md

Lines changed: 20 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -118,6 +118,26 @@ insecure images.
118118
For more details on using Docker Scout in CI, see [Integrating Docker
119119
Scout with other systems](/manuals/scout/integrations/_index.md).
120120

121+
### Comparing Docker Scout results with other scanners
122+
123+
Some vulnerabilities reported by other scanners may not appear in Docker Scout results. This can happen for several
124+
reasons:
125+
126+
- Hardware-specific vulnerabilities: Certain vulnerabilities may only affect specific hardware architectures (for
127+
example, Power10 processors) that are not relevant to Docker images, so they are not reported by Docker Scout.
128+
- VEX statement filtering: Docker Scout automatically applies VEX statements to document and suppress vulnerabilities
129+
that do not apply to the image. If your scanner does not consume VEX statements, you may see more vulnerabilities
130+
reported than what appears in Docker Scout results.
131+
- Temporary vulnerability identifiers: Temporary vulnerability identifiers (like `TEMP-xxxxxxx` from Debian) are not
132+
surfaced by Docker Scout, as they are not intended for external reference.
133+
134+
While Docker Scout handles this filtering automatically, you can manually configure similar filtering with other
135+
scanners using [Grype ignore rules](https://github.com/anchore/grype#specifying-matches-to-ignore) in its configuration
136+
file (`~/.grype.yaml`) or [Trivy policy exceptions](https://trivy.dev/v0.19.2/misconfiguration/policy/exceptions/) using
137+
REGO rules to filter out specific vulnerabilities by CVE ID, package name, fix state, or other criteria. You can also
138+
use VEX statements with other scanners as described in [Use VEX to filter known non-exploitable
139+
CVEs](#use-vex-to-filter-known-non-exploitable-cves).
140+
121141
## Grype
122142

123143
[Grype](https://github.com/anchore/grype) is an open-source scanner that checks

0 commit comments

Comments
 (0)