alegrey91/vex8s
Suppress vulnerabilities applying Kubernetes context to scans
When managing containerized applications in Kubernetes, it helps security teams reduce alert fatigue by generating a VEX (Vulnerability Exploitability eXchange) document. It takes existing vulnerability scan reports (from Trivy or Grype) and Kubernetes manifest files as input. The output is a VEX document that indicates which reported vulnerabilities are not actually exploitable given your cluster's security settings. This helps security engineers, DevOps professionals, and platform engineers focus on critical, exploitable threats.
Use this if you are overwhelmed by the number of vulnerability alerts from container scans and want to prioritize only those that pose a real risk in your Kubernetes environment.
Not ideal if you are looking for a standalone vulnerability scanner or if you do not use Kubernetes for container orchestration.
Stars
17
Forks
—
Language
Go
License
—
Category
Last pushed
Mar 11, 2026
Commits (30d)
0
Get this data via API
curl "https://pt-edge.onrender.com/api/v1/quality/ai-coding/alegrey91/vex8s"
Open to everyone — 100 requests/day, no key needed. Get a free key for 1,000/day.