When using container image vulnerability scanners like Trivy, a large number of vulnerabilities may be detected. However, not all of them necessarily require an action. This is because not all libraries or command-line tools included in the container image are actually utilized.
For example, the `python:3.12.4` image includes a `git` binary with the vulnerability CVE-2024-32002. This vulnerability does not need an immediate action if it is known that the Python application being run does not execute `git` commands.
VEX (Vulnerability-Exploitability eXchange) formats such as OpenVEX can be used to suppress such false alarms.
However, VEX is still not widely adopted due to the difficulty of manual analysis and classification of vulnerabilities.
This presentation introduces VexLLM, a tool that helps writing VEX by leveraging LLMs. VexLLM is available as a plugin for Trivy.
GitHub: https://github.com/AkihiroSuda/vexllm
https://kccncjpn2025.sched.com/event/1x70c