Scanning Docker images for key binaries - going beyond package managers
We've extended our Docker scans to include scanning key binaries that were manually installed on the Docker image, in addition to OS packages installed by package managers such as dpkg, apk or rpm. This new scan ensures protection against vulnerabilities in unmanaged installed binaries, including Node.js and Java Runtime Environment, with more types of binary vulnerabilities to be added soon. The enhanced scan is now available in the latest CLI version, which must be upgraded for use. The Snyk UI will also display key binary vulnerabilities when monitoring a Docker project, allowing easy filtering by type. Automatic reporting of detected vulnerabilities will occur if a supported key binary was installed manually. This new capability enhances our Container Vulnerability Management solution, providing more comprehensive vulnerability data and remediation information.