I am currently trying to integrate AWS ECR Scanning to our CI/CD pipeline and pass the results to our engineers in a human readable form.
The command - aws ecr describe-image-scan-findings --repository-name ${REPNAME} --image-id imageTag=latest --profile ${PROFILE} --region ${REGION}
Returns something like the following [redacted] output -
"imageScanFindings": {
"findings": [
{
"name": "CVE-2018-12886",
"description": "stack_protect_prologue in cfgexpand.c and stack_protect_epilogue in function.c in GNU Compiler Collection (GCC) 4.1 through 8 (under certain circumstances) generate instruction sequences when targeting ARM targets that spill the address of the stack protector guard, which allows an attacker to bypass the protection of -fstack-protector, -fstack-protector-all, -fstack-protector-strong, and -fstack-protector-explicit against stack overflow by controlling what the stack canary is compared against.",
"uri": "https://security-tracker.debian.org/tracker/CVE-2018-12886",
"severity": "MEDIUM",
"attributes": [
{
"key": "package_version",
"value": "8.3.0-6"
},
{
"key": "package_name",
"value": "gcc-8"
},
{
"key": "CVSS2_VECTOR",
"value": "AV:N/AC:M/Au:N/C:P/I:P/A:P"
},
{
"key": "CVSS2_SCORE",
"value": "6.8"
}
]
},
{
"name": "CVE-2020-1751",
"description": "An out-of-bounds write vulnerability was found in glibc before 2.31 when handling signal trampolines on PowerPC. Specifically, the backtrace function did not properly check the array bounds when storing the frame address, resulting in a denial of service or potential code execution. The highest threat from this vulnerability is to system availability.",
"uri": "https://security-tracker.debian.org/tracker/CVE-2020-1751",
"severity": "MEDIUM",
"attributes": [
{
"key": "package_version",
"value": "2.28-10"
},
{
"key": "package_name",
"value": "glibc"
},
{
"key": "CVSS2_VECTOR",
"value": "AV:L/AC:M/Au:N/C:P/I:P/A:C"
},
{
"key": "CVSS2_SCORE",
"value": "5.9"
}
]
},
{
"name": "CVE-2019-20367",
"description": "nlist.c in libbsd before 0.10.0 has an out-of-bounds read during a comparison for a symbol name from the string table (strtab).",
"uri": "https://security-tracker.debian.org/tracker/CVE-2019-20367",
"severity": "MEDIUM",
"attributes": [
{
"key": "package_version",
"value": "0.9.1-2"
},
{
"key": "package_name",
"value": "libbsd"
},
{
"key": "CVSS2_VECTOR",
"value": "AV:N/AC:L/Au:N/C:P/I:N/A:P"
},
{
"key": "CVSS2_SCORE",
"value": "6.4"
}
]
},
{
"name": "CVE-2019-12904",
"description": "In Libgcrypt 1.8.4, the C implementation of AES is vulnerable to a flush-and-reload side-channel attack because physical addresses are available to other processes. (The C implementation is used on platforms where an assembly-language implementation is unavailable.)",
"uri": "https://security-tracker.debian.org/tracker/CVE-2019-12904",
"severity": "MEDIUM",
"attributes": [
{
"key": "package_version",
"value": "1.8.4-5"
},
{
"key": "package_name",
"value": "libgcrypt20"
},
{
"key": "CVSS2_VECTOR",
"value": "AV:N/AC:M/Au:N/C:P/I:N/A:N"
},
{
"key": "CVSS2_SCORE",
"value": "4.3"
}
]
}
],
"imageScanCompletedAt": "2020-10-23T00:03:10+05:30",
"vulnerabilitySourceUpdatedAt": "2020-10-22T16:21:44+05:30",
"findingSeverityCounts": {
"MEDIUM": 14,
"INFORMATIONAL": 72,
"LOW": 18,
"UNDEFINED": 3
}
},
"registryId": "12345678911",
"repositoryName": "name-of-repo",
"imageId": {
"imageDigest": "sha256:1213412412412451241414214141412412",
"imageTag": "latest"
},
"imageScanStatus": {
"status": "COMPLETE",
"description": "The scan was completed successfully."
}
}
The above is not human friendly to read, especially if there are a lot of findings and the JSON output runs into hundreds of lines.
I want to convert the above output in a more "human" readable form without omitting any of the returned info. I tried using the --output table
option for AWS CLI
but it is including a lot of spaces in between the columns and rows.
I tried using jq
to convert it into a table or .tsv of some sort using map
, but with no luck as I am a total beginner in JQ. If someone has any ideas on how to approach this - any help would be appreciated.
Aiming to get something along the following lines which I got from http://json2table.com/ -
The following produces a table with nested subtables in accorance with my understanding of the basic requirements.
Example
To clarify what the main function
json2tree
does, here is an example:Input:
Output (untabified):
Assumptions
Bugs aside, the only assumptions regarding the input data are as follows:
Robustness
The complexity (or at least length) of the implementation is the result of its being fairly robust with respect to the input data. For example, there is no requirement that the top-level objects have the same keys, or that they be specified in a consistent order.
This robustness, however, is achieved at the cost that
tostring
is called whenever a non-scalar JSON entity is found in a context that is not envisioned by (2) above.Helper Functions
Main program