alegrey91/vex8s

Suppress vulnerabilities applying Kubernetes context to scans

31
/ 100
Emerging

When managing containerized applications in Kubernetes, it helps security teams reduce alert fatigue by generating a VEX (Vulnerability Exploitability eXchange) document. It takes existing vulnerability scan reports (from Trivy or Grype) and Kubernetes manifest files as input. The output is a VEX document that indicates which reported vulnerabilities are not actually exploitable given your cluster's security settings. This helps security engineers, DevOps professionals, and platform engineers focus on critical, exploitable threats.

Use this if you are overwhelmed by the number of vulnerability alerts from container scans and want to prioritize only those that pose a real risk in your Kubernetes environment.

Not ideal if you are looking for a standalone vulnerability scanner or if you do not use Kubernetes for container orchestration.

Kubernetes-security vulnerability-management container-security DevSecOps cloud-native-security
No Package No Dependents
Maintenance 10 / 25
Adoption 6 / 25
Maturity 15 / 25
Community 0 / 25

How are scores calculated?

Stars

17

Forks

Language

Go

License

Last pushed

Mar 11, 2026

Commits (30d)

0

Get this data via API

curl "https://pt-edge.onrender.com/api/v1/quality/ai-coding/alegrey91/vex8s"

Open to everyone — 100 requests/day, no key needed. Get a free key for 1,000/day.