How vulnerability scanning works
The scanner runs as a scheduled job (daily at 02:00 UTC by default):Identify scannable artifacts
For each active resource, InfraAudit identifies artifacts it can scan — primarily container images for Kubernetes workloads and EC2 instances with known AMIs.
Trivy scans for CVEs
Trivy scans the artifacts for known CVEs across OS packages, language runtime dependencies (Go, Python, Node.js, etc.), and application libraries.
NVD enrichment
Findings are matched against the NVD feed to pull in CVSS scores, descriptions, and fix versions.
Vulnerability list
In the sidebar, click Vulnerabilities. The table shows:| Column | Description |
|---|---|
| CVE ID | The CVE identifier (e.g. CVE-2024-12345) |
| Severity | CVSS severity: critical, high, medium, or low |
| Affected resource | The resource containing the vulnerable artifact |
| Package | The affected package and version |
| Fix version | The version that resolves the CVE, if one exists |
| Status | open, fixed, or ignored |
| Detected | Timestamp of first detection |
Filtering and triage
Use the filter bar to narrow by severity, resource type, provider, status, or CVE ID. For triage, start with the Critical severity filter — these represent the highest-risk findings and often have known exploits.Vulnerability detail
Click any CVE row to open the detail panel:- CVE description — pulled from NVD
- CVSS score and vector — the full scoring breakdown
- Affected packages — all packages and versions where this CVE appears
- Fix version — the patched version, if available
- References — links to the NVD advisory, vendor bulletins, and patch notes
Managing findings
Mark as fixed
When you’ve patched the package and re-deployed, run a new scan. InfraAudit re-scans the artifact and moves the finding tofixed if the vulnerable version is no longer present:
Ignore a finding
Some CVEs are not exploitable in your specific environment. You can mark them as ignored from the detail panel or via the CLI. Ignored findings are hidden from the default list view but remain in the database for audit purposes:Triggering a manual scan
From the UI, click Run scan on the Vulnerabilities page. From the CLI:Alert configuration
Configure vulnerability alert thresholds under Settings → Notifications. A common configuration: alert oncritical and high findings only, to avoid alert fatigue from low-severity noise.
Recommendations for vulnerabilities
For each critical or high vulnerability with a known fix, InfraAudit generates a recommendation that includes:- The affected resource and package
- The fix version and upgrade command
- Estimated effort and priority score
Next steps
- Recommendations — view and act on fix suggestions
- Alerts — configure notification thresholds
- Automation and jobs — adjust the vulnerability scan schedule