-
Notifications
You must be signed in to change notification settings - Fork 570
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Conflicting config defaults #2239
Comments
👋 Thanks for the issue @benjaminwilcox - This is probably on us to update the documentation to be a bit clearer, but for now here is a quick explanation. Both of these config values live within the larger The first config value you listed The second config value dictates when cpes are being used when a package is not part of a more specific ecosystem
The stock section at the bottom of this config section tells grype to use cpe matching as a fallback for the case when a package is not part of a more specific ecosystem. An example of this kind of package would be when syft finds a binary package NOT part of an OS package manager package. So in short, grype's default behavior is to fallback to cpes for particular packages when there isn't a better upstream datasource. |
Hi @spiffcs, thanks for the explanation, however my question was more about what the best practice should be. The article states to NOT use cpe matching to prevent false positives, but the default grype configs use cpe matching. I would assume that if Anchore's recommendation is not to use cpe matching, then their product's default settings would reflect that and both flags I mentioned would be set to |
No worries! I think the nuance in the article might be found in "Focusing on the Negative" section. The headline is: "After experimenting with a number of options for improving vulnerability matching, ultimately one of the simplest solutions proved most effective: stop matching with CPEs." Given the follow up paragraph below though it could probably say "stop matching with CPEs when better data is available" Our recommendation is definitely of the more the nuanced variety that's reflected in the paragraph below.
|
@spiffcs d'oh, thanks! I completely overlooked that paragraph. Thanks for the clarity! |
This blog post from Anchore states to stop matching with CPEs: https://anchore.com/blog/say-goodbye-to-false-positives/
However the default configuration settings set:
and
Am I missing something here?
The text was updated successfully, but these errors were encountered: