This is heavily dependent upon the outcomes of T287211, T301168 and T290339. If it appears that blubber will be successfully ported over to gitlab.wikimedia.org and function with pipelinelib similarly to how it does now, then we would likely want to implement some variety of container scanning within the appsec pipeline that followed a basic workflow of:
- parse blubber.yaml for relevant images for a given app, repo, system.
- build relevant dockerfiles
- scan for vulnerabilities (and possibly lint/analyze for best practices)
- report results as console output similar to other tests
OSI/FCL-compliant tooling to consider:
- syft (for sbom) and grype (for vuln-scanning)
- clair - perhaps a bit much for our needs
- docker bench - more of a linter/best practices tool
- dockle - also more of a linter
- trivy - perhaps a bit much as well
Tools like snyk's alleged oss container scanner, dagda, etc simply do not satisfy current licensing requirements.