Description
👋 We use grpc-health-probe
in the OpenFGA project, and we actually embed the binary in our built images. We do this so that we can ship a single image but reference different target entrypoints. This is particularly handy for tooling such as Helm charts and Docker Compose, because it allows us to reduce our dependency to just our image which includes the tools needed for health checks and to run the server.
We've quite regularly noticed that dependencies of grpc-health-probe
have unresolved vulnerabilities reported.
Security vulnerability scanning is much more common in cloud-native software delivery today, and since a broader gRPC community may depend on this tool, it would be nice if there was security scanning implemented on top of the artifacts produced by this project.
Would you be open to a PR that adds a vulnerability scan to the PR Github action workflow?
The most common scanners used include:
- govulncheck - for Go projects directly
- https://github.com/aquasecurity/trivy - source and image scanning
- https://snyk.io/ - source and image scanning
I would recommend at least adding scans using govulncheck
and trivy
as these are widely used across the CNCF ecosystem.