Glossary
- Vulnlog
-
An open-source tool and format for tracking, analyzing, and managing software vulnerabilities reported by SCA scanners. The name combines "vulnerability" and "log." The term refers to both the YAML file format and the CLI tool.
- Vulnlog file
-
A YAML file following the Vulnlog specification, identified by the
.vl.yaml(or.vl.yml) file extension. Simple projects may usevulnlog.yaml(orvulnlog.yml). Each Vulnlog file is scoped to a single release branch. - Vulnlog CLI
-
The command-line interface tool that reads Vulnlog files and generates output artifacts (suppression files, HTML reports).
- Vulnerability entry
-
A single record in the
vulnerabilitiessection of a Vulnlog file. Captures a finding (what was found, where, by whom) and the human verdict about it. - Vulnerability ID
-
The primary identifier of a vulnerability entry, stored in the
idfield. Must be unique across all entries and aliases within the file. Preferably a CVE identifier (e.g.,CVE-2021-44228). - Alias
-
An alternative identifier for the same vulnerability, stored in the
aliasesarray. Must not overlap with anyidoraliasesin other entries within the same file. Used for cross-referencing in reports but not for suppression file generation. - Verdict
-
The human triage decision recorded for a vulnerability entry, stored in the
verdictfield. The term reflects a deliberate judgment by an engineer, distinct from automated scanner statuses. Possible values:affected,not affected,risk acceptable. When absent, the vulnerability is considered under investigation. See Verdicts and Justifications. - Under investigation
-
The implicit state of a vulnerability entry when no
verdicthas been set. - Analysis
-
The free-text rationale for the triage decision, stored in the
analysisfield. Records why the team reached the verdict. - Justification
-
The reason why a vulnerability does not affect the project, stored in the
justificationfield. Required when the verdict isnot affected. Values align with the OpenVEX justification vocabulary. See Justification Values. - Severity
-
The assessed severity of a vulnerability. Values:
critical,high,medium,low. Required when the verdict isaffectedorrisk acceptable. - Resolution
-
A structured record that a dependency update or other corrective action was taken, stored in the
resolutionblock. Independent of the verdict — a vulnerability may benot affectedyet still have a resolution. - Report (vulnerability report)
-
A record in the
reportsarray indicating that a specific scanner or source reported the finding. Not to be confused with HTML report (an output artifact). - Reporter type
-
The
reporterfield on a report entry, identifying the scanner or source. A fixed enum (e.g.,trivy,snyk,dependency-check,other). Determines the suppression file format. - Suppression
-
A directive to exclude a vulnerability from a scanner’s findings. Can be temporary (with
expires_at) or permanent (withoutexpires_at). See Suppression. - Suppression file
-
A file generated by the Vulnlog CLI that instructs an SCA scanner to suppress specific findings. Each scanner has its own format.
- Project
-
The
projectsection of a Vulnlog file. Contains metadata: organization, project name, author, and optional contact. - Release
-
A software release tracked in the
releasessection. Releases must be listed in chronological order (oldest first) because the CLI uses array position for range resolution. - Release branch
-
A line of releases sharing a common major/minor version. Each Vulnlog file is scoped to a single release branch. See Branching Strategy for how to organize files across branches.
- Tag
-
A label defined in the optional
tagssection. Provides flexible categorization for deliverables, usage contexts, or any team-specific taxonomy. See Tags and Filtering. - Package URL (purl)
-
A standardized format for identifying software packages. Examples:
pkg:maven/org.apache.logging.log4j/log4j-core@2.14.1,pkg:docker/demo-project@8.1.1. - HTML report
-
An HTML file for communicating vulnerability analysis to stakeholders. Each vulnerability entry corresponds to a single row.
- Stub entry
-
A minimal vulnerability entry containing only required fields (
id,releases,packages,reports). Created during quick triage.