This project has been achived and it is not actively supported or maintained!
Due to the success the functionality of this project has been integrated to Kubescape, see this for installation
Sneeffer is a magic tool that makes some of your vulnerabilities disappear πͺ π
It calculates image vulnerabilities based on (Syft and Grype) in a Kubernetes cluster with an eBPF (Falco) twist! It monitors pods from their start till a limited time to view their file activity and discover which software packages are used in runtime and which are not. Based of this it can remove the packages from vulnerability report that not used therefore cannot be exploited!
See yourself:
The goal of Sneeffer is to find which vulnerabilities (CVEs) are relevant for a specific application of a container by monitoring its file activity and discovering which software packages are touched.
Sneeffer uses Falco base libraries for monitoring container file activity in Kubernets. These libraries are injecting eBPF code to the kernel which monitors relevant Linux system calls. The ebpf-engine that Sneeffer uses can be found in following link: https://github.com/kubescape/ebpf-engine
In general, Sneeffer will work where Falco can run. We have tested it with some of-the-shelf managed clusters and it worked! (GKE, EKS and minikube)
Follow the steps below for every cluster node:
- Confirm that the nodes you want to run Sneeffer on are running Linux kernel version >= 4.14
- Install the relevant Linux headers for the Falco engine. Instructions for the supported distributions can be found in the following link
Note for minikube: In case of general K8s deployment, all cluster nodes must be installed with the relevant Linux headers. In case of minikube deployment the Linux headers must be installed in the minikube container.
Sneeffer can be installed as a Kubernetes DaemonSet using the pre-built image, by running the following command:
kubectl apply -f https://raw.githubusercontent.com/kubescape/sneeffer/master/kubescape_sneeffer_daemonset.yaml
or
kubectl apply -f ./kubescape_sneeffer_daemonset.yaml
This will create the Sneeffer DaemonSet in the default namespace.
Follow the steps below to build Sneeffer from source and install it on your local minikube cluster.
Minikube must be installed on your machine as a prerequisite.
- Compile relevant binaries by running the following script:
./install_dependencies.sh
This step can take ~15 minutes depending on your machine.
- Build Sneeffer
go build -o kubescape_sneeffer .
- Run minikube:
minikube start
- Run Sneeffer:
sudo SNEEFFER_CONF_FILE_PATH=./configuration/SneefferConfigurationFile.txt HOME=<your home directory> ./kubescape_sneeffer
By default, when running Sneeffer locally (in a minikube setup), no change is needed to the configuration file. Make sure that
myNode
key in the configuration file matches to the machine running minikube (default value isminikube
). In case your node name is different, update the configuration file located in./configuration/SneefferConfigurationFile.txt
.
Install a workload (see limitations bellow)
kubectl apply -f https://raw.githubusercontent.com/kubernetes/website/main/content/en/examples/controllers/nginx-deployment.yaml
Then wait for the results (depending your configuration snifferTime
, the default should be 5 minutes)
$ kubectl get rvs -w
NAME AGE
namespace-default.deployment-nginx.name-nginx-6799fc88d8-fmnlz 5m
$ kubectl get rvs namespace-default.deployment-nginx.name-nginx-6799fc88d8-fmnlz -o yaml
apiVersion: kubescape.io/v1
kind: RuntimeVulnSummary
metadata:
creationTimestamp: "2022-10-25T05:24:30Z"
generation: 1
name: namespace-default.deployment-nginx.name-nginx-6799fc88d8-fmnlz
resourceVersion: "69738865"
uid: 7890b55e-d083-4db8-916b-c2a6065817cb
spec:
imageName: docker.io/library/nginx@sha256:970fab39f49cfac758a2c9a73414a483fc56bded6f8c578c651408567dceb356
summary:
description: 8 relevant vulnerabilities detected out of 134 total in this image
image
imageVulns:
all: 134
critical: 2
high: 17
low: 6
medium: 21
negligible: 86
runtimeVulns:
all: 8
critical: 0
high: 0
low: 2
medium: 2
negligible: 4
in order to get more detailed results (list of relevant and irrelevant vulnerabilities):
kubectl get rvd -w
- Sneeffer only creates vulnerability results for pods it saw starting.
Defaults should just work!
Configuration Key | Description |
---|---|
innerDataDirPath |
Where to ave sbom and vuln data |
kernelObjPath |
Kernel object path (it is compiled per node by init container) |
snifferEngineLoaderPath |
Path of binary loader of the kernel object to the container |
sbomCreatorPath |
Path of binary which creates the SBOM (list of files existing in the image) |
vulnCreatorPath |
Path of binary which calculated the list of CVEs for the image |
snifferTime |
Monitoring time of the created container (minutes) |
loggerVerbose |
Log verbose |
crdFullDetailedPath |
CRD yaml file path of the detailed runtime CVE data |
crdVulnSummaryPath |
CRD yaml file path of the summary runtime CVE data |
myNode |
Name of the node that would be monitored |
enableProfiling |
monitor used syscalls and capabilities in runnning pods - false by default - not mandatory |
innerDataDirPath=./data
kernelObjPath=./resources/ebpf/kernel_obj.o
snifferEngineLoaderPath=./resources/ebpf/sniffer
sbomCreatorPath=./resources/sbom/syft
vulnCreatorPath=./resources/vuln/grype
snifferTime=1
loggerVerbose=INFO
crdFullDetailedPath=./resources/k8s/crd-vuln-full-details.yaml
crdVulnSummaryPath=./resources/k8s/crd-vuln-summary.yaml
myNode=minikube
There are software packages which are not loaded by default inside the container when it is ran. Their load can be depending of software configuration, API call, time from start and etc. Sneeffer can only detect behavior which it saw happening thus will only mark vulnerabilities as "relevant" if it saw happening. In case a dynamic load happened during the observation period, it will detected and its vulnerablities marked as relevant.
To optimize results, we suggest running tests on the workload during the observation period. The bigger the test coverage the more precise the results will be.
Interpreted languages are in general supported as well. Their packages are covered as far as the SBOM generated by Syft is complete and contains the packages and their files.