You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
While it is not an OS, this page describes the details of the [Seal Security](https://sealsecurity.io/) vulnerability feed.
7
+
Seal provides security advisories and patched versions for multiple Linux distributions, including [Debian](../os/debian.md), [Ubuntu](../os/ubuntu.md), [Alpine](../os/alpine.md), [Red Hat Enterprise Linux](../os/rhel.md), [CentOS](../os/centos.md), [Oracle Linux](../os/oracle.md), and [Azure Linux (CBL‑Mariner)](../os/azure.md).
8
+
9
+
Seal advisories are used when Trivy finds packages that indicate Seal-provided components:
10
+
11
+
- Packages whose name or source name starts with `seal-` (for example, `seal-wget`, `seal-zlib`).
12
+
13
+
When such Seal packages are detected, Trivy automatically enables Seal scanning for those packages while continuing to use the base OS scanner for the rest.
14
+
15
+
!!! note
16
+
For vulnerabilities, Trivy prefers severity from the base OS vendor when available.
17
+
18
+
For details on supported scanners, features, and behavior for each base OS, refer to their respective pages:
0 commit comments