Skip to content

Commit 84715ba

Browse files
authored
docs: improve limitations section (#1496) (#1604)
1 parent 227dc26 commit 84715ba

File tree

1 file changed

+10
-0
lines changed

1 file changed

+10
-0
lines changed

README.md

Lines changed: 10 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -255,8 +255,18 @@ This tool is meant to be used as a quick-to-run, easily-automatable check in a
255255
non-malicious environment so that developers can be made aware of old libraries
256256
with security issues that have been compiled into their binaries.
257257

258+
The tool does not guarantee that any vulnerabilities reported are actually present or exploitable, neither is it able to find all present vulnerabilities with a guarantee.
259+
260+
Users can add triage information to reports to mark issues as false positives, false negatives, indicate that the risk has been mitigated by configuration/usage changes, and so on.
261+
262+
Triage details can be re-used on other projects so, for example, triage on a Linux base image could be applied to multiple containers using that image.
263+
264+
For more information and usage of triage information with the tool kindly have a look [here](https://cve-bin-tool.readthedocs.io/en/latest/MANUAL.html#i-input-file-input-file-input-file).
265+
258266
If you are using the binary scanner capabilities, be aware that we only have a limited number of binary checkers (see table above) so we can only detect those libraries. Contributions of new checkers are always welcome! You can also use an alternate way to detect components (for example, a bill of materials tool such as [tern](https://github.com/tern-tools/tern)) and then use the resulting list as input to cve-bin-tool to get a more comprehensive vulnerability list.
259267

268+
The tool uses a vulnerability database in order to detect the present vulnerabilities, in case the database is not frequently updated (specially if the tool is used in offline mode), the tool would be unable to detect any newly discovered vulnerabilities. Hence it is highly advised to keep the database updated.
269+
260270
## Requirements
261271

262272
To use the auto-extractor, you may need the following utilities depending on the

0 commit comments

Comments
 (0)