Vulnerability Static Analysis for Containers
Go to file
2017-09-06 17:11:36 -04:00
.github github: add issue template 2017-09-06 17:11:36 -04:00
api database/pgsql: move token lib 2017-08-21 16:25:13 -04:00
cmd/clair API: change api port to api addr, rename RunV2 to Run. 2017-08-18 18:24:34 -04:00
contrib contrib/helm/clair: fix the ingress template 2017-09-06 16:11:53 +01:00
database database/pgsql: move token lib 2017-08-21 16:25:13 -04:00
Documentation Merge pull request #459 from arthurlm44/patch-1 2017-08-31 16:55:18 -04:00
ext Clair Logic, Extensions: updated mock tests, extensions, basic logic 2017-08-10 11:24:40 -04:00
pkg Clair Logic, Extensions: updated mock tests, extensions, basic logic 2017-08-10 11:24:40 -04:00
testdata/DistUpgrade
vendor
.dockerignore
.travis.yml
bill-of-materials.json *: regenerate bill of materials 2017-08-17 16:20:19 -04:00
config.yaml.sample Merge branch 'master' into ancestry_ 2017-08-18 18:25:54 -04:00
DCO
Dockerfile
glide.lock
glide.yaml
LICENSE
NOTICE
notifier.go Clair Logic, Extensions: updated mock tests, extensions, basic logic 2017-08-10 11:24:40 -04:00
README.md README: fix IRC copypasta 2017-08-18 13:41:26 -04:00
ROADMAP.md
updater_test.go Clair Logic, Extensions: updated mock tests, extensions, basic logic 2017-08-10 11:24:40 -04:00
updater.go Clair Logic, Extensions: updated mock tests, extensions, basic logic 2017-08-10 11:24:40 -04:00
worker_test.go Clair Logic, Extensions: updated mock tests, extensions, basic logic 2017-08-10 11:24:40 -04:00
worker.go Clair Logic, Extensions: updated mock tests, extensions, basic logic 2017-08-10 11:24:40 -04:00

Clair

Build Status Docker Repository on Quay Go Report Card GoDoc IRC Channel

Note: The master branch may be in an unstable or even broken state during development. Please use releases instead of the master branch in order to get stable binaries.

Clair Logo

Clair is an open source project for the static analysis of vulnerabilities in application containers (currently including appc and docker).

  1. In regular intervals, Clair ingests vulnerability metadata from a configured set of sources and stores it in the database.
  2. Clients use the Clair API to index their container images; this creates a list of features present in the image and stores them in the database.
  3. Clients use the Clair API to query the database for vulnerabilities of a particular image; correlating vulnerabilities and features is done for each request, avoiding the need to rescan images.
  4. When updates to vulnerability metadata occur, a notification can be sent to alert systems that a change has occured.

Our goal is to enable a more transparent view of the security of container-based infrastructure. Thus, the project was named Clair after the French term which translates to clear, bright, transparent.

Getting Started

Contact

Contributing

See CONTRIBUTING for details on submitting patches and the contribution workflow.

License

Clair is under the Apache 2.0 license. See the LICENSE file for details.