VEX Statements
What is VEX?
VEX (Vulnerability Exploitability eXchange) provides formal statements about whether a reported vulnerability actually affects a given product. When a CVE is reported against a dependency but is not exploitable in our deployment, a VEX statement documents that decision with rationale.
Current VEX Statements
No VEX statements have been issued yet. As vulnerabilities are triaged, formal not-affected and mitigated decisions will appear here.
Format
VEX documents follow the OpenVEX specification, authored as YAML and stored next to each image’s Nix definition:
common/images/{name}.vex.yaml— infrastructure imagesapps/sbomify/images/{name}.vex.yaml— application images
VEX files serve dual purpose: they are converted to JSON and passed to Grype
via --vex to suppress findings at scan time, and rendered here as compliance
evidence.
Each document records:
- The CVE identifier
- The affected product (container image)
- The status (
not_affectedormitigated) - A justification explaining why the vulnerability does not apply
- A timestamp for audit trail purposes