A vulnerability scanner for container images, filesystems, and SBOMs to detect known security issues.
Grype is a vulnerability scanner that detects known security vulnerabilities in container images, filesystem directories, and Software Bill of Materials (SBOMs). It helps identify risks in software packages and dependencies by matching them against vulnerability databases, providing actionable security insights.
Developers, DevOps engineers, and security teams who need to integrate vulnerability scanning into their CI/CD pipelines or local development workflows for containerized applications and software artifacts.
Grype offers fast, comprehensive scanning across multiple formats and ecosystems with built-in threat prioritization, making it a versatile and actionable tool for open-source security without requiring a commercial platform.
A vulnerability scanner for container images and filesystems
Open-Awesome is built by the community, for the community. Submit a project, suggest an awesome list, or help improve the catalog on GitHub.
Supports scanning container images (Docker, OCI, Singularity), filesystem directories, and SBOMs, offering versatile coverage for different software artifacts as highlighted in the README.
Detects vulnerabilities in a wide range of OS packages (e.g., Alpine, Debian, RHEL) and language-specific packages (e.g., Ruby, Java, Python, Go), covering major ecosystems per the documentation.
Incorporates EPSS, KEV, and risk scoring to highlight the most critical vulnerabilities, making results more actionable for security teams, as described in the features.
Supports OpenVEX for filtering and augmenting results with exploitability context, enhancing vulnerability assessment accuracy based on the README's feature list.
Lacks a built-in graphical user interface or web dashboard, which can be a barrier for non-technical users or teams preferring visual tools over CLI workflows.
Requires regular updates to vulnerability databases for accurate results, and offline usage may be challenging without proper caching or local mirror setup, not explicitly addressed in the README.
Advanced features like centralized reporting, role-based access control, or deep integration with proprietary systems may require commercial support from Anchore, as hinted in the commercial options section.