How to Consume an SBOM through Bomber

Can Özkan
2 min readNov 13, 2023

So you’ve asked a vendor for a Software Bill of Materials (SBOM) for one of their closed-source products, and they provided one to you in a JSON file. Now what?

The first thing you want to do is to see if any of the components listed inside the SBOM have security vulnerabilities and what kind of licenses these components have. This will help you identify the kind of risk you will be taking by using the product. [1]

Download the proper bomber file based on your OS and architecture.

Install the deb file via dpkg.

I will scan my SBOM file for possible vulnerabilities. You can see the detailed information regarding the provided SBOM input file.

This work has been supported in part by the Energy Transition Fund of the FPS Economy of Belgium through the CYPRESS project, and in part by the VLAIO COOCK program through the IIoT-SBOM project.

Thanks for reading.

Can Özkan

References

[1] https://github.com/devops-kung-fu/bomber

Sign up to discover human stories that deepen your understanding of the world.

Free

Distraction-free reading. No ads.

Organize your knowledge with lists and highlights.

Tell your story. Find your audience.

Membership

Read member-only stories

Support writers you read most

Earn money for your writing

Listen to audio narrations

Read offline with the Medium app

Can Özkan
Can Özkan

Written by Can Özkan

Security Researcher, Penetration Tester, and Reverse Engineer

No responses yet

Write a response