CVE
How End-of-Life Software Accumulates Vulnerabilities
A conceptual article outlining the risk involved with using EOL software and how EOL images accrue vulnerabilities.
How to Use Chainguard Security Advisories
Article outlining how one can explore and use the Security Advisories found on the Chainguard Container Directory.
How Chainguard Issues Security Advisories
The life cycle of Chainguard-Issued Security Advisories
Using wolfictl to Manage Security Advisories
Guide on how to use the wolfictl tool to create, update, and manage security advisories
False Positives and False Negatives with Container Images Scanners
An overview of the formation of false positive and false negative vulnerability results in container image scanners
Using Grype to Scan Software Artifacts
Learn to use Grype to detect CVEs in images
Using Trivy to Scan Software Artifacts
Learn to use Trivy to analyze container images and other software artifacts for a variety of issues