From e464862248b61e755e74313b663e48c11ca8b573 Mon Sep 17 00:00:00 2001 From: Andy Suderman Date: Fri, 26 May 2023 07:57:46 -0600 Subject: [PATCH] Fix typo and add a colon --- README.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/README.md b/README.md index 6750a5c..d76bf98 100644 --- a/README.md +++ b/README.md @@ -4,9 +4,9 @@ This utility interacts with the Fairwinds BIF-Server to find base images and rep ## What and Why is it? -When using a container scanning tool to identivy known vulnerabilities (CVEs, or common vulnerabilities and exposures), it can be difficult to understand _where_ the vulnerabilities exist in the container, and how to mitigate them. Often, the simplest and most efficient mitigation is to update the "base image" - or the image used in the `FROM` statement in your container definition. +When using a container scanning tool to identify known vulnerabilities (CVEs, or common vulnerabilities and exposures), it can be difficult to understand _where_ the vulnerabilities exist in the container, and how to mitigate them. Often, the simplest and most efficient mitigation is to update the "base image" - or the image used in the `FROM` statement in your container definition. -BIF allows you to understand the impact of updating the base image of your container will have. +BIF allows you to understand the impact of updating the base image of your container will have: * First, it can detect what base image the container is using, even though it doesn't have access to the Dockerfile. * Second, it will show you what vulnerabilities are present in that base image. * Lastly, it will show you what versions of that base image don't have that vulnerability.