-
Notifications
You must be signed in to change notification settings - Fork 591
New issue
Have a question about this project? # for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “#”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? # to your account
Catalog discovered SBOMs #737
Comments
|
Yes, I'd like syft to support cataloguing SBOMs for this reason. Go binaries have a solution here via the Go binary cataloguer. But for other languages like Rust/C++ dependency information isn't inspectable from the binaries. For containerized Rust applications I want to drop an SBOM into the container image and have syft detect the Rust dependencies from that. |
What would you like to be added:
If a container image (or directory) being scanned contains an SBOM it would be interesting to consider taking additional actions based on detecting that it's an SBOM. These actions might be:
This would give syft a more intelligent avenue for SBOM data discovered other than reporting it as "another file" discovered within the scanned source.
Why is this needed:
This could play into #31 , but that is not clear yet.
Additional context:
If a "merge" of the discovered SBOM and the current SBOM is selected, it is important to be transparent about which packages were not directly detected by a package cataloger and which were (and specifically, which SBOM file each package came from). Additionally, if the merge path is detected this has certain implications about the ID-system for packages (there may be overlap in IDs used, which can get complicated fast).
The text was updated successfully, but these errors were encountered: