
Grype integration
Focus Grype's container image scan results on vulnerabilities that are actually exploitable.
Integration details
Primary category
Container Image Security
Sync direction
Grype ↔ Konvu
Findings are ingested from Grype into Konvu. Based on your workflow, Konvu can then push context, status changes, and severity updates back to Grype.
Status
Available
What is Grype?
Grype is an open-source vulnerability scanner by Anchore that scans container images and filesystems for known vulnerabilities by matching installed packages against multiple vulnerability databases.
Why connect Grype to Konvu
- Cut through Grype's comprehensive CVE matches by surfacing only vulnerabilities that are exploitable in your specific codebase and runtime configuration.
- Bridge the gap between Grype's CLI output and your team's workflow with centralized triage and evidence tracking.
- Prioritize container image findings based on exploitability in your environment, not just severity scores.
How it works
Scan
Grype produces findings from scans or assessments.
Ingest & enrich
Konvu ingests those findings and enriches them with code, configuration, and deployment context.
Assess exploitability
Konvu determines exploitability and recommended action with evidence attached.
Sync decisions
Based on your workflow, Konvu can push context, status updates, and severity adjustments back into Grype.
Quick setup
Configure Grype from the integrations list in Konvu.
- 1Go to /configuration/integrations in Konvu and choose Grype.
- 2Authorize access and confirm the data sources you want to sync.
- 3Save the configuration to start syncing.
Sync direction
Grype ↔ Konvu
Findings are ingested from Grype into Konvu. Based on your workflow, Konvu can then push context, status changes, and severity updates back to Grype.
More integrations
View allSnyk
Triage Snyk vulnerabilities across code, dependencies, and containers with exploit context.
Trivy
Filter Trivy's comprehensive scan output to focus on exploitable vulnerabilities.

Anchore
Triage Anchore policy violations and SBOM vulnerabilities with exploitability analysis.
Aqua Security
Triage Aqua image CVEs and vulnerability findings with exploitability analysis.
Docker Scout
Focus Docker Scout recommendations on vulnerabilities exploitable in your environment.

Sysdig
Prioritize Sysdig vulnerability findings with environment-specific exploitability analysis.