Projects
Overview of Anchore Open Source tools
Overview of Anchore Open Source tools
Users running Grype versions older than v0.88.0 will stop receiving vulnerability database updates on March 6, 2026.
Use Grype to scan your container images, directories, or archives for known vulnerabilities.
Architecture and design of the Grype vulnerability scanner
Developer guidelines when contributing to Grype
Explore the different scan targets Grype supports including container images, directories, SBOMs, and individual packages
Learn how Grype selects vulnerability data for different package types and what level of accuracy to expect
Learn how to scan container images, filesystems, and SBOMs for known software vulnerabilities.
Learn how to read and interpret Grype’s vulnerability scan output, including match types, confidence levels, and result reliability
Guidelines for developing & contributing to Anchore Open Source projects
Understand how Grype detects packages from end-of-life Linux distributions and why vulnerability data may be incomplete
Learn how to work with Grype’s native JSON format
Control which vulnerabilities Grype reports using filtering flags, configuration rules, and VEX documents
Verifying release assets after downloading
Using the Grype Vulnerability Database
Configure authentication for scanning container images from private registries using credentials, registry tokens, and credential helpers.
Configuration patterns and options used across all Anchore OSS tools