Detect application vulnerabilities in container images
Last updated
Was this helpful?
Last updated
Was this helpful?
In one scan, Snyk can detect the vulnerabilities in your application dependencies from container images, as well as from the operating system.
Detecting application vulnerabilities is intended for scanning third-party images. This feature was not designed for detecting issues in code developed in-house, where the user has access to the source code and can shift left and detect Issues earlier in the SDLC by using Snyk Code and Snyk Open Source.
Detecting application vulnerabilities in container images for Container Registry integration is supported for Node, Ruby, PHP, Python, Go binaries, and Java. For the CLI and Kubernetes, this feature is supported for Node, PHP, Python, Go binaries, and Java.
After you integrate with a container registry and import your Projects, Snyk scans your image for vulnerabilities.
For application Projects created from images that are imported from container registry integrations, the applications are not re-imported during recurring scans or manual rescans.
Instead, the application dependencies that are found during the initial image import are scanned for new vulnerabilities.
If new dependencies are introduced in an application within an image, they will not be detected by recurring scans or manual rescans. To detect new or updated applications within images from container registries, you must re-import the image to Snyk.
For applications found in images imported from the Kubernetes integration, existing applications will be re-imported, but new apps added to the image will not be imported during recurring scans. To detect new applications within images from Kubernetes, you must re-import the image to Snyk.
To enable the application vulnerability scan from container registries:
Navigate to Integrations, and then to your container registry integration settings.
Enable Detect application vulnerabilities and save the changes.
When you are scanning an image using a container registry or Kubernetes integration, the scan also uses the --app-vulns
flag by default. You can opt out of the flag in the container registry only. To do this, disable the Detect application vulnerabilities feature.