Version 1.2
Support in OpenShift
Added support for OpenShift containers in Self-Hosted and Cloud environments.
New APIs
Introduced a new REST API that retrieves a list of Workloads.
Image tag Investigation Improvement
All image-relevant data is now in a single view for a better user experience.
Runtime Node Status
Added status for nodes running without a sensor in Cluster Management.
Version 1.3
Workload Automation Service
Create event-driven Workers to automate responses to workload changes.
Workers provide a serverless execution environment, triggered by real-time platform events like image updates and security insights.
Mapping Vulnerable Images to Clusters and Workloads
Quickly identify where risks exist in your environment by mapping vulnerable images to affected clusters and workloads.
Use the Live Assessment view to identify and remediate image-based vulnerabilities across workloads and clusters more efficiently.
Version 1.4
AWS Fargate Support
JFrog Runtime now supports AWS Fargate, enabling serverless container execution without managing infrastructure.
Installation options for non-gRPC environments
Added support for configuring the Runtime Service with alternative ingress controllers and REST fallback, along with improved sensor installation options for non-gRPC environments and self-signed certificates.
Version 1.7
Live Assessment Enhancements
- Introducing clearer vulnerability segmentation, including Critical & High CVEs, Applicable CVEs (validated via Contextual Analysis), and Running CVEs for active workloads.
- Previously combined CVE categories are now broken out to provide more actionable, severity-based insights.
- Image details now include richer context such as associated workloads, cluster and namespace details, registry name, repository path, providers, deployer information, and Owners Info (application owners).
Automatic Security Scanning for Runtime-Detected Images
Runtime now automatically scans any container image detected in a Kubernetes cluster. If a runtime-observed image lacks security data, the system automatically indexes and scans it using SCA and Advanced Security scanners. This ensures full, consistent security coverage across all cluster-running images with simple configuration