You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
The Native Image Inspect Tool extracts embedded Software Bill of Materials (SBOM) from native executables. The functionality for extracting class-level metadata is no longer supported.
To take it further, you can submit the SBOM to any available vulnerability scanner, and check if the recorded libraries have known security vulnerabilities.
Copy file name to clipboardExpand all lines: docs/security/SBOM.md
+5-8Lines changed: 5 additions & 8 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -23,18 +23,15 @@ The SBOM feature can be disabled with `--enable-sbom=false`.
23
23
24
24
## Extracting SBOM Contents
25
25
26
-
After embedding the compressed SBOM into the executable, the [Native Image Inspect Tool](../reference-manual/native-image/InspectTool.md) is able to extract the compressed SBOM using the `--sbom` parameter accessible through `$JAVA_HOME/bin/native-image-inspect --sbom <path_to_binary>` from both executables and shared libraries.
27
-
It outputs the SBOM in the following format:
28
-
29
26
After embedding the compressed SBOM into the image, there are two possible ways to extract the SBOM contents:
30
-
- using the [Native Image Inspect Tool](../reference-manual/native-image/InspectTool.md)
27
+
- using the [Native Image Configure Tool](#native-image-configure-tool)
31
28
- using [Syft](https://github.com/anchore/syft){:target="_blank"}
32
29
33
30
### Native Image Configure Tool
34
31
35
-
The Native Image Inspect Tool is able to extract the compressed SBOM using the `extract-sbom` command from executables and shared libraries.
32
+
The Native Image Configure Tool can extract the compressed SBOM using the `extract-sbom` command from executables and shared libraries.
@@ -124,9 +121,9 @@ It also integrates with GitHub Actions, GitLab, and Jenkins Pipelines.
124
121
125
122
Another popular command-line scanner is `grype`, part of the [Anchore software supply chain management platform](https://anchore.com/){:target="_blank"}.
126
123
With `grype`, you can check whether the libraries listed in your SBOMs have known vulnerabilities documented in Anchore's database.
127
-
The output of the `native-image-inspect` tool can be fed directly into `grype` to scan for vulnerable libraries using the following command:
124
+
The output of the `native-image-configure` tool can be fed directly into `grype` to scan for vulnerable libraries using the following command:
0 commit comments