diff --git a/.yardstick.yaml b/.yardstick.yaml index 364dfb96..016a8c3e 100644 --- a/.yardstick.yaml +++ b/.yardstick.yaml @@ -97,6 +97,7 @@ x-ref: - gcr.io/distroless/python3-debian11@sha256:69ae7f133d33faab720af28e78fb45707b623bcbc94ae02a07c633bf053f4b40 - registry.suse.com/suse/sles12sp4:26.380@sha256:94b537f5b312e7397b5d0bbb3d892f961acdd9454950fc233d77f771e25335fb - registry.suse.com/suse/sle15:15.1.6.2.461@sha256:6e613c994c3b33224e439ef8ee9003fb69416f77f7a6b1da0b18981d5aa3bb75 + - docker.io/anchore/test_images:azurelinux3-63671fe@sha256:2d761ba36575ddd4e07d446f4f2a05448298c20e5bdcd3dedfbbc00f9865240d # these images are intended to have "partial coverage" when it comes to labels. These labels are narrowly targeted at confirmed # results or from sources that only report narrow findings. Analyses that use these images cannot confidently compute an F1 score, diff --git a/labels/anchore+test_images@sha256:2d761ba36575ddd4e07d446f4f2a05448298c20e5bdcd3dedfbbc00f9865240d/c8495189-698b-4e6a-86c2-6dea014fc703.json b/labels/anchore+test_images@sha256:2d761ba36575ddd4e07d446f4f2a05448298c20e5bdcd3dedfbbc00f9865240d/c8495189-698b-4e6a-86c2-6dea014fc703.json new file mode 100644 index 00000000..9ec29854 --- /dev/null +++ b/labels/anchore+test_images@sha256:2d761ba36575ddd4e07d446f4f2a05448298c20e5bdcd3dedfbbc00f9865240d/c8495189-698b-4e6a-86c2-6dea014fc703.json @@ -0,0 +1 @@ +{"ID": "c8495189-698b-4e6a-86c2-6dea014fc703", "effective_cve": "CVE-2022-41722", "image": {"exact": "anchore/test_images@sha256:2d761ba36575ddd4e07d446f4f2a05448298c20e5bdcd3dedfbbc00f9865240d"}, "label": "TP", "package": {"name": "golang", "version": "1.22.5-1.azl3"}, "timestamp": "2024-08-27T20:02:33.804132+00:00", "tool": "grype@path:../../+import-db=db.tar.gz", "user": "willmurphy", "vulnerability_id": "CVE-2022-41722"} \ No newline at end of file