|Welcome||FAQ||Inclusion Process||Roadmap||Security Tab||Mitigation Notes||JFrog Container Registry||Inclusion from Source|
Learn How Security in ChartCenter Works
ChartCenter uses JFrog Xray to scan each available Helm chart and the dependencies associated with it and provides CVE information by severity level from the National Vulnerability Database.
The information available on ChartCenter may not include all vulnerabilities and the actual severities thereof and is based on running a limited version of JFrog’s Xray.
High severity vulnerabilities will be hidden until the maintainer of the chart chooses to activate that information by providing mitigation notes.
By default, the security tab for each chart version will show you unknown, low, and medium severities using the CVSS v2 rating. We’ve provided chart maintainers a feature that allows them to tell us when they’d like to expose high vulnerability data.
We’ve given chart maintainers control over high severity information to encourage them to fix or provide mitigation notes on these issues. Our goal is not to penalize chart maintainers for issues that are found in third-party components. Our intention is to provide chart users enough information to make informed choices about which chart versions to use.
This information is presented on the security tab in columns, but you can also see which vulnerabilities are present on the dependencies tab and drill down into the container image to see more.
How Chart Maintainers can Activate High Vulnerabilities
Are you the maintainer of a Helm chart on ChartCenter?
ChartCenter shows vulnerability details for medium, low, and unknown severity vulnerabilty by default, but have chosen to give maintainers control over what level of detail they’d like to make available to the community for high vulnerabilities.
We provide chart maintainers the power to activate high severity vulnerability details once they’ve had the opportunity to provide mitigation notes on the UI.
Many Helm charts use third-party components and we’re aware that these components are not under direct control of the chart maintainer. In an effort to strike the right level of balance between making chart safety a priority, and giiving maintainers a fair ability to engage intelligently with chart users, and we have created a system to ensure maintainers can choose when to provide details about high severities on the UI for publically-listed vulnerabilities.
This means, we do not provide vulnerability information from the full set of proprietary databases that paid Xray users have access to.
The ChartCenter security tab includes the ability for chart maintainers to provide notes under each individual CVE using the security-mitigation.yaml file.
You can provide the security-migitation.yaml file in two ways:
- Include the this yaml file in your latest chart
- Email us the security-mitigation.yaml file from email associated with your chart or repo
The specifications for this yaml file can be found here.