Vulnerability Static Analysis for Containers
Go to file
2018-11-28 13:37:15 -05:00
.github .github: add stale and issue template enforcement 2018-09-26 13:07:20 -04:00
api api: Rename detector type to DType 2018-10-08 14:34:19 -04:00
cmd/clair clair: Implement worker detector support 2018-10-08 10:42:40 -04:00
contrib Pinning helm postgres dep to the working 1.0.0 2018-10-31 10:56:17 -04:00
database database: add FindLock dbutil 2018-11-28 13:37:15 -05:00
Documentation *: remove bzr dependency 2018-07-10 16:46:46 -04:00
ext vulnsrc_oracle: one vulnerability per CVE 2018-11-02 19:36:43 -04:00
pkg Merge pull request #647 from KeyboardNerd/spkg/cvrf 2018-10-23 09:30:01 -04:00
testdata/DistUpgrade clair: move worker to top level package 2017-01-26 18:24:04 -05:00
vendor vendor: Update gopkg.in/yaml.v2 package 2018-10-22 23:00:58 -04:00
.dockerignore Adding httputil and version packages 2018-09-05 14:56:39 -04:00
.travis.yml Bump Go versions and use '.x' to always get latest patch versions 2018-10-28 13:44:21 +01:00
bill-of-materials.json api: remove dependency on graceful 2018-09-06 16:56:33 -04:00
code-of-conduct.md update CoC 2018-01-04 12:29:49 -08:00
config.yaml.sample config: removed worker config 2018-09-19 14:33:08 -04:00
DCO Initial commit 2015-11-13 14:11:28 -05:00
Dockerfile Add build-base to docker image 2018-09-26 08:17:33 +10:00
glide.lock vendor: Update gopkg.in/yaml.v2 package 2018-10-22 23:00:58 -04:00
glide.yaml vendor: Update gopkg.in/yaml.v2 package 2018-10-22 23:00:58 -04:00
LICENSE Initial commit 2015-11-13 14:11:28 -05:00
NOTICE Initial commit 2015-11-13 14:11:28 -05:00
notifier.go database: add (Acquire|Release)Lock dbutils 2018-11-27 13:59:07 -05:00
README.md README: fixed issues address 2018-03-19 21:21:38 -07:00
ROADMAP.md *: update roadmap 2018-10-08 15:10:27 -04:00
updater_test.go updater: Add vulnsrc affected feature type 2018-10-18 15:06:41 -04:00
updater.go database: add FindLock dbutil 2018-11-28 13:37:15 -05:00
worker_test.go database: move dbutil and testutil to database from pkg 2018-10-08 12:10:35 -04:00
worker.go database: rename utility functions with commit/rollback 2018-10-08 13:12:18 -04:00

Clair

Build Status Docker Repository on Quay Go Report Card GoDoc IRC Channel

Note: The master branch may be in an unstable or even broken state during development. Please use releases instead of the master branch in order to get stable binaries.

Clair Logo

Clair is an open source project for the static analysis of vulnerabilities in application containers (currently including appc and docker).

  1. In regular intervals, Clair ingests vulnerability metadata from a configured set of sources and stores it in the database.
  2. Clients use the Clair API to index their container images; this creates a list of features present in the image and stores them in the database.
  3. Clients use the Clair API to query the database for vulnerabilities of a particular image; correlating vulnerabilities and features is done for each request, avoiding the need to rescan images.
  4. When updates to vulnerability metadata occur, a notification can be sent to alert systems that a change has occured.

Our goal is to enable a more transparent view of the security of container-based infrastructure. Thus, the project was named Clair after the French term which translates to clear, bright, transparent.

Getting Started

Contact

Contributing

See CONTRIBUTING for details on submitting patches and the contribution workflow.

License

Clair is under the Apache 2.0 license. See the LICENSE file for details.