Security Scanning
Generate SBOMs, CBOMs, and malware reports from running containers.
This guide covers CLI commands for testing and one-off scans. For automated scanning, see Scheduling.
Find Your Workloads
List pods that reel can operate on:
SBOM (Software Bill of Materials)
Generate a full software inventory with vulnerability and secret detection using Trivy.
By default this runs all scanners. Use --scanners vuln or --scanners secret to run specific ones. See S3 Exports for bucket configuration.
Output is CycloneDX 1.5 JSON, compatible with Dependency-Track, OWASP tools, and most SBOM platforms.
CBOM (Cryptographic Bill of Materials)
Identify cryptographic assets for quantum readiness assessment.
What It Detects
| Category | Examples |
|---|---|
| Algorithms | AES, RSA, SHA-256, ECDSA |
| Certificates | X.509 certs with expiration dates |
| Protocols | TLS/SSH configurations |
| Keys | Public/private key files |
Malware Scanning
Scan container filesystems with ClamAV.
Scan specific path:
Detects: Viruses, trojans, rootkits, suspicious executables, and known malicious patterns.
ClamAV sidecar must be enabled in the Helm values. Check status with reel health
Scheduled Scanning
Daily SBOM + Weekly CBOM
See Scheduling for full configuration and S3 Exports for authentication setup.