CVE
How End-of-Life Software Accumulates Vulnerabilities
A conceptual article outlining the risk involved with using EOL software and how EOL images accrue vulnerabilities.
How to Use Chainguard Security AdvisoriesArticle outlining how one can explore and use the Security Advisories found on the Chainguard Container Directory.
How Chainguard Issues Security AdvisoriesThe life cycle of Chainguard-Issued Security Advisories
Using wolfictl to Manage Security AdvisoriesGuide on how to use the wolfictl tool to create, update, and manage security advisories
False Positives and False Negatives with Container Images ScannersAn overview of the formation of false positive and false negative vulnerability results in container image scanners
Using Grype to Scan Software ArtifactsLearn to use Grype to detect CVEs in images
Using Trivy to Scan Software ArtifactsLearn to use Trivy to analyze container images and other software artifacts for a variety of issues