Viewing Scanning Results

2025-07-17 03:49:31

1.         Log in to the CSG Console.

2.         On the left navigation bar, select Image security  > Image management  to go to the Image management  page.

3.         On the left side of the registry image  page, you can filter and view by registry > registry name. Click the button between the tree structure and the image list to fold the tree structure.

4.         The top of the repository image list summarizes the total number of vulnerabilities in the current repository or project and classified statistics based on high-, medium-, and low-risk levels and different risk characteristics. The statistical results change correspondingly based on the change in the selection on the left tree structure. Click the category of images you want to view, and the image list conducts filtering and query based on the condition you click.

5.         In the repository image list, you can filter and query by image name, image ID, image version, software name, software version, vulnerability number, blocking policy, risk level, and security issue.

6.         The parameters in the repository image list are described as follows:

Parameter

Description

Image Name

The name of the image, usually in the   format of repository name or project name/image name.

Image Version

Serves as the tag information of the   image, which can distinguish images with the same name.

Operating System

The system type of the base image for   building the image.

Source Repository

Obtains the source repository name for   the image.

Blocking Policy

Divided into Blocked and Passed,   which displays the processing results after image scanning.

When an image has a risk issue, the   risk can be handled by blocking.

Risk Level

The risk levels include high risk,   moderate risk, low risk, unknown (scanning failure), unscanned, and safe.

Security Issue

The security issues include:   vulnerabilities, ransomware, vulnerabilities requiring special focus, Trojan   

horse viruses, custom exception files, risk files, custom exception software   versions, disallowed software licenses, 

custom exception environment variables,   untrusted images, unknown, no security issues, non-automatic pushing images.

Discovery Time

The time when the system first obtained   the image.


Viewing Node Images

1.         Log in to the CSG Console.

2.         On the left navigation bar, select Image security  > Image management  to go to the Image management  page.

3.         Select the node image  tab to go to the node image  page.

 4.         On the left side of the node image  page, you can filter and view by Cluster name > Node name. Click the < button between the tree structure and the image list to fold the tree structure.

5.         The top of the node image list summarizes the total number of vulnerabilities in the current cluster or node and classified statistics based on high-, medium-, and low-risk levels and different risk characteristics. The statistical results change correspondingly based on the change in the selection on the left tree structure. Click the category of images you want to view, and the image list conducts filtering and query based on the condition you click.

6.         In the node image list, you can filter and query by image name, image ID, image version, software name, software version, vulnerability number, cluster name, node name, blocking policy, running status, risk level, and security issue.

The parameters in the node image list are described as follows:

Parameter

Description

Image Name

The name of the image, usually in the   format of repository name or project name/image name.

Image Version

Serves as the tag information of the   image, which can distinguish images with the same name.

Operating System

The system type of the base image for   building the image.

Cluster Name

The name of the cluster where the image   is located.

Node Name

The name of the node where the image is   located.

Blocking Policy

Divided into Blocked and Passed, which   displays the processing results after image scanning.

When an image has a risk issue, the   risk can be handled by blocking.

Running Status

The running status of the   image-associated container, which is divided into running, stopped, and not   running.

Risk Level

The risk levels include high risk,   moderate risk, low risk, unknown (scanning failure), unscanned, and safe.

Security Issue

The security issues include:   vulnerabilities, ransomware, vulnerabilities requiring special focus, 

Trojan   horse viruses, custom exception files, risk files, custom exception software   versions, 

disallowed software licenses, custom exception environment variables,   untrusted images, unknown, and no security issues.

Discovery Time

The time when the image was first   updated.

 

Viewing Image Details

1.         Log in to the CSG Console.

2.         On the left navigation bar, select Image security  > Image management  to go to the Image management  page.

3.         Select the registry image  or node image  tab to go to the corresponding image list page.

4.         Click image name in the image list, and go to the details page to view the basic information, associated information, vulnerabilities, software, files, environment variables, security traceability, and other related information of the image.

Viewing the Image Security Overview

On the summary page, you can view the basic information about images, risk scores, security issues, security policies for image hits, security suggestions, and other information.

Viewing Image-Associated Containers

On the related container page, you can view information about the container associated with the image, including the container name, the name of the pod where the container resides, the name of the cluster to which the container belongs, and the name of the node where the container runs.

 

Viewing Image Vulnerability Details

On the vulnerability page, you can view the vulnerability statistics of each risk level in the image. Click CVE in the vulnerability list to view detailed information of the vulnerability, including vulnerability introduction, vulnerability score, source information, etc.

 

  • Click"Hit security policy" on the detail page to view the security policy for vulnerability hits.

  • Click"Join the whitelist" in the details operation column to ignore this vulnerability. After the addition is complete, the vulnerabilities added to the trustlist are no longer displayed when scanning this image.

Viewing Image Software Information

On the Software page, you can view the relevant information about the software in the current image and the hitting policy in the software. In addition, you can add the software to the trustlist.

Click"Join the whitelist" to the right of the software list to mask security issues with the software. After the addition is complete, this software will not hit the security policy.

Viewing File Information in the Image

On the file page, you can view all the file information in the image and the file hit policy. In addition, you can add the file to the trustlist and download it locally.

  • To mask security issues with the file, click"Join the whitelist" in the file list operation column.

  • To download a file locally, click download in the file list operation column.

  • Click"File preview" in the file list operation column, and you can view the content of the file without downloading it.

Viewing Image Environment Variables

On the environment variables page, you can view all the environment variables in the image and the security policy for hitting environment variables.

Security Traceability

On the security tracing page, you can view the security risks introduced in the image building history and related information, including the ID of the image layer, building commands, introduced risk points, and operation time.

 


42ZCkfykl2mF