You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
The Native Image Inspect Tool extracts embedded Software Bill of Materials (SBOM) from native executables. The functionality for extracting class-level metadata is no longer supported.
12
17
13
-
## Extracting Embedded SBOM
18
+
## Extracting Embedded SBOM (Deprecated)
14
19
15
20
Native Image embeds an SBOM at build time to detect any libraries that may be susceptible to known security vulnerabilities.
To take it further, you can submit the SBOM to any available vulnerability scanner, and check if the recorded libraries have known security vulnerabilities.
Copy file name to clipboardExpand all lines: docs/security/SBOM.md
+6-9Lines changed: 6 additions & 9 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -23,18 +23,15 @@ The SBOM feature can be disabled with `--enable-sbom=false`.
23
23
24
24
## Extracting SBOM Contents
25
25
26
-
After embedding the compressed SBOM into the executable, the [Native Image Inspect Tool](../reference-manual/native-image/InspectTool.md) is able to extract the compressed SBOM using the `--sbom` parameter accessible through `$JAVA_HOME/bin/native-image-inspect --sbom <path_to_binary>` from both executables and shared libraries.
27
-
It outputs the SBOM in the following format:
28
-
29
26
After embedding the compressed SBOM into the image, there are two possible ways to extract the SBOM contents:
30
-
- using the [Native Image Inspect Tool](../reference-manual/native-image/InspectTool.md)
27
+
- using the [Native Image Configure Tool](#native-image-configure-tool)
31
28
- using [Syft](https://github.com/anchore/syft){:target="_blank"}
32
29
33
-
### Native Image Inspect Tool
30
+
### Native Image Configure Tool
34
31
35
-
The [Native Image Inspect Tool](../reference-manual/native-image/InspectTool.md) is able to extract the compressed SBOM using the `--sbom`parameter, accessible from both executables and shared libraries:
32
+
The Native Image Configure Tool can extract the compressed SBOM using the `extract-sbom`command from executables and shared libraries.
@@ -124,9 +121,9 @@ It also integrates with GitHub Actions, GitLab, and Jenkins Pipelines.
124
121
125
122
Another popular command-line scanner is `grype`, part of the [Anchore software supply chain management platform](https://anchore.com/){:target="_blank"}.
126
123
With `grype`, you can check whether the libraries listed in your SBOMs have known vulnerabilities documented in Anchore's database.
127
-
The output of the `native-image-inspect` tool can be fed directly into `grype` to scan for vulnerable libraries using the following command:
124
+
The output of the `native-image-configure` tool can be fed directly into `grype` to scan for vulnerable libraries using the following command:
Copy file name to clipboardExpand all lines: substratevm/CHANGELOG.md
+1Lines changed: 1 addition & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -7,6 +7,7 @@ This changelog summarizes major changes to GraalVM Native Image.
7
7
* (GR-43070) Add a new API flag `-Werror` to treat warnings as errors.
8
8
* (GR-69280) Allow use of the `graal.` prefix for options without issuing a warning.
9
9
* (GR-2092) Add jitdump support for recording run-time compilation metadata for perf (see PerfProfiling.md). Can be enabled with `-g -H:+RuntimeDebugInfo -H:RuntimeDebugInfoFormat=jitdump`.
10
+
* (GR-69572) Deprecates the `native-image-inspect` tool. To extract embedded SBOMs, use `native-image-configure extract-sbom --image-path=<path_to_binary>`.
10
11
11
12
## GraalVM 25
12
13
* (GR-52276) (GR-61959) Add support for Arena.ofShared().
0 commit comments