Logo
find AI list
TasksToolsCompareWorkflows
Submit ToolSubmit
Log in
Logo
find AI list

Search by task, compare top tools, and use proven workflows to choose the right AI tool faster.

Platform

  • Tasks
  • Tools
  • Compare
  • Alternatives
  • Workflows
  • Reports
  • Best Tools by Persona
  • Best Tools by Role
  • Stacks
  • Models
  • Agents
  • AI News

Company

  • About
  • Blog
  • FAQ
  • Contact
  • Editorial Policy
  • Privacy
  • Terms

Contribute

  • Submit Tool
  • Manage Tool
  • Request Tool

Stay Updated

Get new tools, workflows, and AI updates in your inbox.

© 2026 findAIList. All rights reserved.

Privacy PolicyTerms of ServiceEditorial PolicyRefund Policy
Home/Tasks/Grype
Grype logo

Grype

A fast and lightweight vulnerability scanner for container images and filesystems.

Security & Privacy
Good for
Vulnerability scanningSBOM-based security auditing
0 views
0 saves
Visit Website
  • About
  • Main Tasks
  • Decision Summary
  • Key Features
  • How it works
  • Quick Start
  • Pros & Cons
  • FAQ
  • Similar Tools
Switch To Simple View

About Grype

Grype is a specialized vulnerability scanner developed by Anchore, designed to identify software vulnerabilities (CVEs) within container images and filesystems. Built in Go, its technical architecture focuses on speed and accuracy by leveraging a regularly updated internal database that aggregates data from multiple sources, including the NVD, GitHub Advisories, and various Linux distribution security feeds. In the 2026 market, Grype remains a cornerstone of the 'SBOM-first' security movement. It works seamlessly with Syft, its sister tool, to ingest Software Bill of Materials (SBOMs) and perform lookup-only scanning, which significantly reduces compute overhead in CI/CD pipelines. Its design philosophy emphasizes interoperability, supporting various output formats such as SARIF and JSON to integrate with modern security orchestration platforms. Unlike monolithic security suites, Grype is purpose-built for the developer's CLI and automated build environments, offering features like VEX (Vulnerability Exploitability eXchange) support to filter out non-exploitable vulnerabilities, thereby reducing developer fatigue. As organizations move toward mandatory software transparency, Grype serves as the primary engine for continuous compliance and supply chain security validation.

Core Capabilities

Grype is a specialized vulnerability scanner developed by Anchore, designed to identify software vulnerabilities (CVEs) within container images and filesystems.

Main Tasks

Vulnerability scanning

Explore all tools that specialize in vulnerability scanning. This domain focus ensures Grype delivers optimized results for this specific requirement.

Find Tools

SBOM-based security auditing

Explore all tools that specialize in sbom-based security auditing. This domain focus ensures Grype delivers optimized results for this specific requirement.

Find Tools

CI/CD security gating

Explore all tools that specialize in ci/cd security gating. This domain focus ensures Grype delivers optimized results for this specific requirement.

Find Tools
Decision Summary

What this tool is best suited for

Best Fit
Cybersecurity
Buying Signals
Pricing not specified
No API listed
Web-first workflow
Setup And Compliance
Not specified
No onboarding steps listed
No compliance tags listed
Trust Signals
Pricing freshness unavailable
URL health not shown
Verification date unavailable
Compare And Alternatives

Shortlist Grype against top options

Open side-by-side comparison first, then move to deeper alternatives guidance.

Compare nowView alternatives
No verified pros/cons are available yet for this tool.

Pros

  • No verified strengths listed yet.

Cons

  • No verified trade-offs listed yet.

Reviews & Ratings

Verified feedback from other users.

Reviews

No reviews yet. Be the first to rate this tool.

Write a Review

0/500

Core Tasks

  • Vulnerability scanning
  • SBOM-based security auditing
  • CI/CD security gating

Target Personas

Cybersecurity

Categories

Security & PrivacyCybersecurity

Alternative Tools

View More Explore All Tools
Forensically logo

Forensically

Digital Forensics

Professional-grade digital image forensics and manipulation detection in the browser.

23d ago
Best for Cybersecurity
PricingFree
Free
Clone Detection
Error Level Analysis
Metadata Extraction
FOSSA logo

FOSSA

Software Composition Analysis (SCA)

Automated open-source compliance and security for high-velocity engineering teams.

23d ago
Best for CybersecurityHas API
PricingFreemium
Freemium
License Compliance
Vulnerability Scanning
SBOM Management
iRedMail logo

iRedMail

Email Infrastructure

The Open Source, Full-Featured Mail Server Solution for Enterprise Reliability and Data Sovereignty.

23d ago
Best for CybersecurityHas API
PricingFreemium
Freemium
Deployment of full-stack SMTP/IMAP services
Spam and virus filtering configuration
User and domain directory management
Ivanti Neurons logo

Ivanti Neurons

IT Service Management

AI-powered IT & Security platform that automates workflows and provides insights.

23d ago
Best for CybersecurityHas API
PricingPaid
Paid
IT Service Management
Endpoint Management
Security Management
Jit logo

Jit

DevSecOps

Orchestrate DevSecOps with Security-as-Code for fast-moving engineering teams.

23d ago
Best for CybersecurityHas API
PricingFreemium
Freemium
Automated Vulnerability Remediation
Secret Leak Prevention
Infrastructure as Code Scanning
Kount logo

Kount

Fraud Detection

AI-driven fraud prevention and digital identity trust for global e-commerce.

23d ago
Best for CybersecurityHas API
PricingPaid
Paid
Payment Fraud Prevention
Account Takeover Protection
Identity Verification
Lakera Guard logo

Lakera Guard

AI Security

AI-native security platform providing runtime protection for AI applications against emerging threats.

23d ago
Best for CybersecurityHas API
PricingPaid
Paid
Threat Detection
Prompt Injection Prevention
Data Leakage Protection
MyVoice AI logo

MyVoice AI

Voice AI

Real-time Voice Biometrics and Neural Synthesis for Secure Identity Management

23d ago
Best for CybersecurityHas API
PricingFreemium
Freemium
Voice Biometric Authentication
Anti-Spoofing Liveness Detection
Neural Voice Cloning