Tune Out Noise From Your Container Image Vulnerability Scans
First, let's see how a typical container vulnerability scan works.
We noticed that due to the security features of containers, the majority of vulnerabilities are simply not exploitable. Using smart rules, we filter out these kinds of vulnerabilities.
We also maintain a database of vulnerabilities that are conditionally false positives. Thus, leveraging the context of how the container is used to filter out false positives.