Go package scanning

Software vulnerabilities are weaknesses that can either cause an accidental system failure or be intentionally exploited. The On-Demand Scanning API allows you to manually scan container images for vulnerabilities in system packages and vulnerabilities in Go packages.

See pricing to learn more about the costs associated with scanning container images.

Supported versions

The On-Demand Scanning API reports vulnerabilities for system packages, packages in the Go standard library, and external Go packages not included in the standard library. The vulnerabilities are reported with a different label for each type of package. See the scanning how-to guide for more information.

Severity levels for vulnerabilities

Go package scanning uses the following severity levels:

  • Critical
  • High
  • Medium
  • Low
  • Minimal

The severity levels are qualitative labels that reflect factors such as exploitability, scope, impact, and maturity of the vulnerability. Two types of severity are associated with each vulnerability:

  • Effective severity - The severity level assigned by the GitHub Advisory Database, with a slight difference: Moderate is reported as Medium by Container Analysis.

  • CVSS score - The Common Vulnerability Scoring System score and associated severity level. Refer to the CVSS 2.0 documentation for details on how CVSS scores are calculated.

For a given vulnerability, the severity derived from a calculated CVSS score might not match the effective severity. You can decide the vulnerability score relevant for your project.

What's next