Container vulnerability scanning

We use Trivy to scan our container images for security vulnerabilities. It breaks down a container image into components and alerts on components with CVEs. We scan our container images for Critical and High severity CVEs.

We currently run Trivy in two ways:

  • Daily as a CronJob in the security-tooling kubernetes cluster.
  • In our CI on image builds.

The daily scan is meant to catch new CVEs in our existing components. It also sends alerts to the security team on new vulnerabilities. The results are sent to a GCP bucket and stored for compliance purposes.

The CI scan is used to catch CVEs in new components. It acts on non-blocking mode in the CI.

Running Trivy locally

Sourcegraph Trivy docker image

We can run the same image as the CronJob locally and have results uploaded to the GCP bucket. Authentication to GCP is necessary. Run the image with:

docker run -it -v ~/.config/gcloud:/.config/gcloud

Trivy binary

You can also install Trivy and scan specific images. Trivy can be installed with homebrew:

brew install aquasecurity/trivy/trivy

Once Trivy is installed running scans on images is easy:

trivy image --severity "HIGH,CRITICAL" <IMAGE>:insiders

This scans an image for High/Critical CVEs. The -f json flag can be used to output data in JSON format, which includes a lot more information on the vulnerable components and versions.

Accepted vulnerabilities and false positives

Trivy finds many vulnerabilities that are either false positives (where we are not actually vulnerable) or that we decide to accept because it presents low risk to us. It’s not expected for all images to be cleared of all High/Critical CVEs due to these issues with the tool. This is according to our Vulnerability Management Policy. Current CVEs that are accepted or false positives are documented here.

For Security engineers

When a new vulnerability is found by Trivy it’s the resposibility of the security engineer on support rotation to triage and fix it.


To triage a Trivy vulnerability and confirm its risk to our environment confirm the vulnerable versions on the official vulnerability source and the component by running:

trivy image --severity "HIGH,CRITICAL" -f json {IMAGE}

grep the results and you will find the exact version of the component the image has. It’s often useful to exec into a running container with the image and run the binary to check versions.


If a component or base image has a CVE we decide whether to patch it based on the risk of the vulnerability and of the patch. For example, if we have a High severity CVE but that actually does not present risk to our application and the upgrade is of several major versions we may choose to not upgrade. On the other hand, if the patches are available for minor versions we should always patch regardless of the vulnerability risk.

Most docker images we create have build scripts that can be run locally. In case the CI does not build the image when changes are committed to a PR, you can force an image build with:

sg ci build docker-images-patch <image>

More information here

A recommended process to test patches is:

  1. Run a trivy scan on the current published image.
  2. Make any changes to the Dockerfile.
  3. Build the image locally.
  4. Run a trivy scan on the local image and confirm the CVE is patched.
  5. Push changes to a branch and fix any CI failures.
  6. If the image is built during tests scan the published image. If not, use sg ci build to run a build with tests.
  7. Merge the PR.

For Release Guild members

For each release there is a release-blocking issue (example where we need to confirm that all open CVEs are documented and accepted. The release captain may check the last Trivy results in GCP and check if the open CVEs are already tracked here. If so, the issue may be closed. If there are any non-documented open CVEs please contact the Security team.

For Sourcegraph engineers

If you got a CI warning for a Trivy vulnerability it is not your responsibility to patch it. To encourage our High Agency value we encourage engineers to look into CVEs and providing patches where feasible. Please note that we don’t expect to fix all CVEs, and accepted vulnerabilities are tracked here.

For CEs

It’s common for our customers to scan the container images we ship to them. These scans usually contain vulnerabilities that are either false positives or that we have accepted as low risk. All open container vulnerabilities can be found here, where there is context that can be shared with the customer.

For customer scans the CE should cross-check the vulnerabilities found in the customer scan with the ones we have documented in the security-issues repository. If we missed any please bring it to the attention of the Security team in the #security channel.