Inspecting Live Software Components

JFrog Security User Guide

This guide provides instructions on inspecting live software components using the Runtime Live Assessment capability. This enables you to view and search live runtime information, identify potential security risks, and monitor the health of your runtime environments.

Warning

Data in the Live Assessment is retained for 10 days before deletion.

Active Components Runtime Inspects

Runtime ComponentDescription
ImagesPackaged files containing code and configurations needed to run applications, traceable to their source in JFrog Artifactory.
WorkloadsApplications and services actively running in Kubernetes clusters, managed by resources like Deployments, StatefulSets, or DaemonSets.
ProcessesIndividual executable instances within workloads, detailed with vulnerability data for monitoring and risk management.

Risks Runtime Alerts Against

RiskDescription
Malicious PackagesDetects harmful code within software components.
Untrusted ImagesIdentifies images originating from unverified registries.
Critical & High CVEsHighlights vulnerabilities by severity.
Applicable CVEsIndicates vulnerabilities confirmed as applicable by Contextual Analysis.
Running CVEsShows vulnerabilities detected in currently active workloads.
Integrity ViolationsFlags discrepancies between Artifactory images and running binaries.

Inspecting Your Images

Gain comprehensive visibility into runtime images by tracing them back to their JFrog Artifactory source, evaluating usage, and identifying security risks. Quickly spot untrusted sources, integrity violations, and critical CVEs, with key details like the highest risk level, total vulnerabilities, and tag-specific insights to prioritize remediation. By detecting discrepancies between Artifactory images and running binaries, you can proactively mitigate risks and strengthen your runtime security.

Image information includes a number of associated workloads, cluster and namespace details, registry name, repository path, associated providers, and deployer information. The Owners Info section lists the application owners associated with the image.

Accessing Image Information

  1. From the JFrog Platform, under Runtime, select Live Assessment.
  2. Select the Images tab to view all detected images.
  3. Select an image to open the Detailed View.

The detailed view presents risk and vulnerability insights through dedicated widgets and tables:

  • Critical & High CVEs – Displays the number of critical and high-severity vulnerabilities detected in the image.
  • Running CVEs – Shows vulnerabilities currently associated with running workloads.
  • Applicable CVEs – Indicates the subset of critical and high vulnerabilities determined as applicable by Contextual Analysis.

If a malicious package is detected, a red banner appears at the top of the image details panel.

Additional fields provide context on the image, including:

  • Number of clusters
  • Registry name
  • Repository path
  • Providers
  • Owners Info (application owners)
  • Build and Deployed by details

Inspecting Your Workloads

Inspect workloads in your runtime environment with Runtime Live Assessment to monitor active applications, identify security risks, and gain infrastructure-wide insights. Workloads, managed by Kubernetes resources like Deployments, StatefulSets, DaemonSets, or Jobs, consist of containers linked to images and running processes. The Workloads Table highlights risks such as integrity violations, untrusted registries, critical CVEs, and malicious packages, along with total vulnerabilities, workload status, and location details across clusters, nodes, and namespaces to help you quickly detect and address security issues.

Accessing Workloads in Runtime Live Assessment

1. From the JFrog Platform, under Runtime, select Live Assessment.

2. Select the Workloads tab to view all detected workloads.

3. Select a workload.

4. Click on a specific process to see detailed information.

Inspecting Your Processes

Before You Begin:

Process inspection is available only with Runtime Impact (Controller + Sensors).

1. From the JFrog Platform, under Runtime, select Live Assessment.

2. Select the Processes tab to view all detected workloads.

3. Review the Processes Table.

4. (Optional) Apply filters to narrow down processes based on specific criteria.

Identifying Risk Locations in Runtime by Mapping Vulnerable Images to Clusters and Workloads

  1. From the JFrog Platform, under Runtime, select Live Assessment.
  2. Under the Images tab, select an image with detected risks.
  3. Select an image Tag with detected risks.
    The detailed view opens.
  4. To view the risks detected in the workloads running on vulnerable images, select the Workloads tab.
  5. To view the risks detected in the clusters containing workloads running on vulnerable images, select the Clusters tab.