veinmind-vuln 用于扫描容器/镜像的资产和漏洞信息
- 扫描镜像/容器的OS信息
- 扫描镜像/容器内系统安装的packages
- 扫描镜像/容器内应用安装的libraries
- 扫描镜像/容器是否存在已知cve (beta)
- linux/amd64
- linux/386
- linux/arm64
- linux/arm
请先安装libveinmind
,安装方法可以参考官方文档
make run ARG="scan xxx"
编译可执行文件
make build
运行可执行文件进行扫描
chmod +x veinmind-vuln && ./veinmind-vuln scan xxx
确保机器上安装了docker
以及docker-compose
make run.docker ARG="scan xxxx"
构建veinmind-vuln
镜像
make build.docker
运行容器进行扫描
docker run --rm -it --mount 'type=bind,source=/,target=/host,readonly,bind-propagation=rslave' veinmind-vuln scan xxx
1.指定镜像名称或镜像ID并扫描 (需要本地存在对应的镜像)
./veinmind-vuln scan image [imageID/imageName]
./veinmind-vuln scan image
./veinmind-vuln scan container [containerID/containerName]
4.扫描所有本地容器
./veinmind-vuln scan container
5.指定输出格式 支持的输出格式:
- html
- json
- cli(默认)
./veinmind-vuln scan image [imageID/imageName] -f html
生成的result.html效果如图:
./veinmind-vuln scan image [imageID/imageName] -v
./veinmind-vuln scan image [imageID/imageName] --type [os/python/npm/jar.....]
8.仅扫描资产信息
./veinmind-vuln scan image [imageID/imageName] --only-asset