tern
Tern is a software composition analysis tool and Python library that generates a Software Bill of Materials for container images and Dockerfiles. The SBOM that Tern generates will give you a layer-by-layer view of what's inside your container in a variety of formats including human-readable, JSON, HTML, SPDX and more.
Top Related Projects
CLI tool and library for generating a Software Bill of Materials from container images and filesystems
Find vulnerabilities, misconfigurations, secrets, SBOM in containers, Kubernetes, code repositories, clouds and more
A vulnerability scanner for container images and filesystems
Vulnerability scanner written in Go which uses the data provided by https://osv.dev
OpenSSF Scorecard - Security health metrics for Open Source
Quick Overview
Tern is an open-source software composition analysis tool for container images and Dockerfiles. It generates a Software Bill of Materials (SBOM) for container images, helping users understand the components and dependencies within their containers, as well as potential security vulnerabilities and license compliance issues.
Pros
- Provides detailed analysis of container images and Dockerfiles
- Generates comprehensive SBOMs in various formats (SPDX, CycloneDX)
- Supports multiple package managers and operating systems
- Integrates with CI/CD pipelines for automated analysis
Cons
- May have performance issues with large container images
- Limited support for some less common package managers
- Requires root access for certain operations, which can be a security concern
- Documentation could be more comprehensive for advanced use cases
Getting Started
To get started with Tern, follow these steps:
-
Install Tern using pip:
pip install tern -
Analyze a container image:
tern report -i <image_name> -
Analyze a Dockerfile:
tern report -d <path_to_dockerfile> -
Generate an SBOM in SPDX format:
tern report -f spdx -i <image_name> -o sbom.spdx
For more advanced usage and configuration options, refer to the official Tern documentation.
Competitor Comparisons
CLI tool and library for generating a Software Bill of Materials from container images and filesystems
Pros of Syft
- Faster scanning and analysis of container images and filesystems
- More comprehensive software bill of materials (SBOM) generation
- Better integration with CI/CD pipelines and other tools
Cons of Syft
- Less detailed reporting on package vulnerabilities
- Limited support for analyzing container layers individually
Code Comparison
Syft:
func (s *Scanner) Scan(ctx context.Context, src source.Source) (pkg.Catalog, []artifact.Relationship, error) {
var catalog = pkg.NewCatalog()
var relationships []artifact.Relationship
// ... (scanning logic)
return catalog, relationships, nil
}
Tern:
def scan_image(image_obj):
# ... (setup and initialization)
for layer in image_obj.layers:
# ... (layer analysis)
return image_obj
def get_image_option(args):
# ... (image option parsing)
return image, tern_image
The code snippets show different approaches to scanning container images. Syft uses Go and focuses on generating a catalog and relationships, while Tern uses Python and emphasizes layer-by-layer analysis. Syft's approach may contribute to its faster performance, while Tern's method allows for more granular examination of container layers.
Find vulnerabilities, misconfigurations, secrets, SBOM in containers, Kubernetes, code repositories, clouds and more
Pros of Trivy
- Faster scanning speed and performance
- Broader vulnerability database coverage
- More comprehensive scanning capabilities (containers, filesystems, git repositories)
Cons of Trivy
- Less detailed software bill of materials (SBOM) generation
- Limited customization options for report formats
Code Comparison
Trivy command-line usage:
trivy image python:3.9
Tern command-line usage:
tern report -i python:3.9
Both tools can scan container images, but Trivy's syntax is generally simpler for basic scans. Tern provides more detailed SBOM information but may require additional configuration for comprehensive results.
Trivy offers a wider range of scanning targets and vulnerability databases, making it more versatile for general security scanning. However, Tern excels in generating detailed software composition analysis reports, which can be valuable for compliance and licensing purposes.
While Trivy is often faster and easier to use out of the box, Tern provides more granular control over the scanning process and report generation. The choice between the two depends on specific use cases and requirements for vulnerability scanning versus detailed SBOM generation.
A vulnerability scanner for container images and filesystems
Pros of Grype
- Faster scanning speed, especially for large images
- More comprehensive vulnerability database, including multiple sources
- Active development with frequent updates and community support
Cons of Grype
- Limited to vulnerability scanning, while Tern offers broader software composition analysis
- May produce more false positives due to its aggressive scanning approach
- Less detailed information about package relationships and dependencies
Code Comparison
Tern example (Python):
def get_full_packagename(package_name, package_version):
return package_name + '-' + package_version
Grype example (Go):
func GetFullPackageName(name string, version string) string {
return fmt.Sprintf("%s-%s", name, version)
}
Both projects aim to analyze container images, but their approaches differ. Tern focuses on generating Software Bills of Materials (SBOMs) and providing detailed package information, while Grype specializes in vulnerability scanning.
Tern offers a more comprehensive analysis of package relationships and dependencies, making it suitable for compliance and licensing purposes. Grype, on the other hand, excels in rapid vulnerability detection across various ecosystems.
Choose Tern for in-depth software composition analysis and SBOM generation. Opt for Grype if your primary concern is quick and thorough vulnerability scanning in container images and filesystems.
Vulnerability scanner written in Go which uses the data provided by https://osv.dev
Pros of osv-scanner
- Focuses specifically on vulnerability scanning, providing more targeted results
- Utilizes the Open Source Vulnerability (OSV) database for comprehensive coverage
- Supports scanning multiple package ecosystems (npm, PyPI, Go, etc.)
Cons of osv-scanner
- Limited to vulnerability scanning, lacking broader software composition analysis features
- Does not provide detailed information about container images or system packages
Code Comparison
osv-scanner:
func (s *Scanner) Scan(ctx context.Context, pkgs []pkg.Package) ([]result.Vulnerability, error) {
vulns, err := s.client.QueryBatch(ctx, pkgs)
if err != nil {
return nil, err
}
return vulns, nil
}
Tern:
def scan_image(image_obj):
layer_objects = image_obj.get_layer_objects()
for layer in layer_objects:
packages = collect_packages(layer)
analyze_packages(packages)
return image_obj
The code snippets demonstrate the different approaches:
- osv-scanner focuses on querying vulnerabilities for packages
- Tern performs a more comprehensive analysis of container layers and packages
OpenSSF Scorecard - Security health metrics for Open Source
Pros of Scorecard
- Broader focus on overall project security and best practices
- More active development and community engagement
- Integrates with GitHub Actions for automated checks
Cons of Scorecard
- Less specialized for container image analysis
- May require more setup and configuration for specific use cases
- Limited to GitHub projects, while Tern can analyze local images
Code Comparison
Scorecard (Go):
func GetRepository(ctx context.Context, repoURL string, client *github.Client) (*Repository, error) {
owner, repo, err := parseGitHubURL(repoURL)
if err != nil {
return nil, fmt.Errorf("parsing GitHub URL: %w", err)
}
// ... (additional code)
}
Tern (Python):
def get_shell_commands(shell_command_line):
"""Given a shell command line, get a list of commands"""
# use shlex to split the command line
return shlex.split(shell_command_line)
The code snippets demonstrate different languages and focuses. Scorecard's example shows GitHub API interaction, while Tern's snippet deals with shell command parsing, reflecting their distinct purposes.
Convert
designs to code with AI
Introducing Visual Copilot: A new AI model to turn Figma designs to high quality code using your components.
Try Visual CopilotREADME

Welcome to the Tern Project
Tern is a software package inspection tool that can create a Software Bill of Materials (SBOM) for containers. It's written in Python3 with a smattering of shell scripts.
Table of Contents
- Introduction
- Getting Started
- Using Tern
- Report Formats
- Extensions
- Running tests
- Project Status
- Contributing
What is Tern?
Tern is an inspection tool to find the metadata of the packages installed in a container image. The overall operation looks like this:
- It analyzes the first layer of the container image to collect information like distro type, package format, and package managers.
- It then executes scripts from the "command library" in a chroot environment to collect information about packages installed in that layer.
- With that information as a starting point, it continues to analyze the subsequent layers in the container image.
- Once done, it generates a report of packages with their metadata. Several formats are available. The report, in its default format, provides a layer by layer, explanation of the various software components imported. If a Dockerfile is provided, the report indicates the Dockerfile lines corresponding to each of the file system layers.
Tern gives you a deeper understanding of your container's bill of materials so you can make better decisions about your container based infrastructure, integration and deployment strategies. It's also a good tool if you are curious about the contents of the container images you have built.

Getting Started
GitHub Action
A GitHub Action is available if you just want to scan Docker container images to find the Base OS and packages installed. Please contribute changes here. Thanks to Jeroen Knoops @JeroenKnoops for their work on this.
Getting Started on Linux
If you have a Linux OS you will need a distro with a kernel version >= 4.0 (Ubuntu 16.04 or newer or Fedora 25 or newer are good selections) and will need to install the following requirements:
- Git (Installation instructions can be found here: https://git-scm.com/book/en/v2/Getting-Started-Installing-Git)
- attr (sudo apt-get install attr or sudo dnf install attr)
- Python 3.6 or newer (sudo apt-get install python3.6(3.7) or sudo dnf install python36(37))
- Pip (sudo apt-get install python3-pip).
- jq (sudo apt-get install jq or sudo dnf install jq)
- skopeo (See here for installation instructions or building from source)
Some distro versions have all of these except attr, jq, and/or skopeo preinstalled. attr and jq are common utilities and are available via the package manager. skopeo has only recently been packaged for common Linux distros. If you don't see your distro in the list, your best bet is building from source, which is reasonably straightforward if you have Go installed.
For analyzing Dockerfiles and to use the "lock" function
- Docker CE (Installation instructions can be found here: https://docs.docker.com/engine/installation/#server)
NOTE: We do not provide advice on the usage of Docker Desktop
Once installed, make sure the docker daemon is running.
Create a python3 virtual environment:
python3 -m venv ternenv
cd ternenv
NOTE: Your OS might distribute each Python version separately. For example, on Ubuntu LTS, Python 2.7 is linked to python2 and Python 3.6 is linked to python3. I develop with Python 3.7 which is installed separately with no symlinks. In this case, I use the binary. The binaries are usually installed in /usr/bin/python.
Activate the virtual environment:
source bin/activate
NOTE: This specific activate script only works for Bash shells. If you need to activate a Fish Shell or C Shell you should use source bin/activate.fish or source bin/activate.csh, respectively.
Install tern:
pip install tern
Run Tern:
tern report -o output.txt -i debian:buster
Getting Started with Docker
Docker is the most widely used tool to build and run containers. If you already have Docker installed, you can run Tern by building a container with the Dockerfile provided.
Clone this repository:
git clone https://github.com/tern-tools/tern.git
Build the Docker image (called ternd here). You may need to use sudo:
docker build -f docker/Dockerfile -t ternd .
This will install the latest release of tern using pip.
If you want to build a Docker image containing the latest changes to tern, run:
python setup.py sdist
docker build -f ci/Dockerfile -t ternd .
NOTE: By default, Tern will run with logging turned on. If you would like to silent the terminal output when running the ternd container, make the following change to the Dockerfile ENTRYPOINT before building:
--- a/Dockerfile
+++ b/Dockerfile
-ENTRYPOINT ["tern"]
+ENTRYPOINT ["tern", "-q"]
Run the ternd container image
docker run --rm ternd report -i debian:buster
If you are using this container to analyze Dockerfiles and to use the "lock" feature, then you must volume mount the docker socket. We have a convenience script which will do that for you.
./docker_run.sh ternd "report -i debian:buster" > output.txt
To produce a json report run
./docker_run.sh ternd "report -f json -i debian:buster"
Tern is not distributed as Docker images yet. This is coming soon. Watch the Project Status for updates.
WARNING: If using the --driver fuse or --driver overlay2 storage driver options, then the docker image needs to run as privileged.
docker run --privileged -v /var/run/docker.sock:/var/run/docker.sock ternd --driver fuse report -i debian:buster
You can make this change to the docker_run.sh script to make it easier.
Creating a Kubernetes Job
A Tern container can be deployed on Kubernetes as a Job. However, a host mount is required to retrieve the reports. We will describe below how to create a Kubernetes Job within minikube.
To install minikube, follow these instructions. If using a virtual machine manager, make sure it supports volume mounts. We will be using VirtualBox in this example.
Download the existing Tern Dockerfile
wget https://raw.githubusercontent.com/tern-tools/tern/main/docker/Dockerfile
Start minikube
minikube start --driver=virtualbox
Use minikube to build the Tern container image
minikube image build -t tern:test -f Dockerfile .
Once build has completed, you should see the image by running minikube image ls. It should look something like docker.io/library/tern:test.
We are now ready to create a Job. You can modify the following YAML according to your host's filesystem:
apiVersion: batch/v1
kind: Job
metadata:
name: tern
spec:
template:
spec:
restartPolicy: Never
containers:
- image: docker.io/library/tern:test
# in order run the job for other containers, replace the "-i" argument here
command: ["tern", "report", "-i", "docker.io/library/debian:buster", "-o", "/host/report.txt"]
name: tern-example
volumeMounts:
- name: host-mount
mountPath: /host # this path exists in the pod
volumes:
- name: host-mount # create a corresponding directory on the host
hostPath:
path: /path/to/tern/reports # this path must exist on the host
We can now deploy Tern on Kubernetes
minikube kubectl -- apply -f tern-example.yaml
To check the status of the Job, you can run minikube kubectl -- describe job.batch/tern. You should be able to see report.txt in /path/to/tern/reports/.
Getting Started with Vagrant
Vagrant is a tool to setup an isolated virtual software development environment. If you are using Windows or Mac OSes and want to run Tern from the command line (not in a Docker container) this is the best way to get started as Tern does not run natively in a Mac OS or Windows environment at this time.
Install
Follow the instructions on the VirtualBox website to download VirtualBox on your OS.
Follow the instructions on the website to install Vagrant for your OS.
Create a Vagrant environment
NOTE: The following steps will install the latest PyPI release version of Tern. If you want to install Tern from the tip of master, please instead follow "Setting up a development environment on Mac and Windows" in the contributing guide.
In your terminal app, run the following commands.
Clone this repository:
git clone https://github.com/tern-tools/tern.git
Bring up the Vagrant box:
cd tern/vagrant
vagrant up
SSH into the created VM:
vagrant ssh
Run:
tern report -i debian:buster -o output.txt
Using Tern
WARNING: The CLI has changed since the last release. Visit Tern's PyPI project page to find the correct CLI options or just run tern -h.
Tern creates a report containing the Software Bill of Materials (SBOM) of a container image, including notes about how it collects this information, and files for which it has no information about. Currently, Tern supports containers only built using Docker using image manifest version 2, schema 2. Docker image manifest version 2, schema 1 has been deprecated by Docker. Tern will support container images created using Docker version 19.03.0 or later. Docker is the most ubiquitous type of container image that exists so the project started with a focus on those. However, it is architected to support other images that closely follow the OCI image spec.
Generating an SBOM report for a Docker image
If you have a Docker image pulled locally and want to inspect it
tern report -i debian:jessie
The SBOM of packages that are installed in the Docker image and how Tern got this information will be printed to the console. To direct this output to a file, use the -o file_name command line option. If you encounter any errors, please file an issue.
Generating an SBOM report from a Dockerfile
You can provide a Dockerfile to Tern to figure out the Software Bill of Materials and other information. Tern will build the image, analyze it with respect to the Dockerfile and discard the image. This is useful to engineers who are developing a Dockerfile for their app or in a container build and release pipeline.
tern report -d samples/photon_git/Dockerfile
The SBOM of packages you would be shipping if you were to use the given Dockerfile will print to the console. To direct the output to a file, use the -o file_name command line option. Feel free to try this out on the other sample Dockerfiles in the samples directory or on Dockerfiles you may be working with. If it doesn't work for you, please file an issue.
Generating a locked Dockerfile
Because of the way Docker builds containers, Dockerfiles are generally not declarative or reflective of what ultimately gets included in the container image that gets produced. Pinning information in your Dockerfile (base OS, packages, etc.) can help create more reproducible container images should your Dockerfile be distributed to other parties. If you have a Dockerfile that you would like to lock to a more reproducible version, Tern can help.
tern lock Dockerfile
The locked Dockerfile will be created in Dockerfile.lock unless an output file is otherwise specified. To specify an output file
tern lock Dockerfile -o output.txt
If the packages are not pinned in the resulting Dockerfile.lock or output file that gets produced, it is because 1) Tern does not know the version of the packages to pin (i.e. unable to get this information from the package manager) or 2) your Dockerfile failed to build. In the case of a failed Dockerfile build, Tern only builds the base image and tries to pin what it can. If you encounter any errors, please file an issue.
Report Formats
Tern creates SBOM reports suitable to read over or to provide to another tool for consumption. A collection of sample reports is available to view here.
Understanding the Reports
Tern provides a handful of different reporting styles that may work better for different applications of distribution, interoperability and comprehension. Understanding these reports will vary slightly between formats, but the information in the different report formats will generally be the same with varying degrees of package metadata detail. In all report formats, information about the version of Tern that generated the report and any applicable extension information will be at the top of the report followed by information about the metadata found in the container, organized sequentially by layer.
The base layer (Layer 1) will provide operating system information on which the container is based, the Dockerfile command that created the layer, the package retrieval method and any packages found in the layer. Note that the operating system information may be different than the container that Tern is generating an SBOM for. For example, the golang container's base OS is actually Debian GNU/Linux 10 (buster). For each subsequent layer in the container, information about the Dockerfile command that created the container layer, any warnings about unrecognized Dockerfile commands, the package retrieval method and package information is provided. If Tern doesn't find any package information in a layer, it will report packages found in the layer as "None". File licenses may also be available in the reports if Tern is run using scancode.
More information about specific reporting formats can be found below and in the tern/classes directory where the properties being reported on are explained in the .py files -- specifically, image_layer.py, package.py, and file_data.py.
Human Readable Format
The default report Tern produces is a human readable, high-level overview. The object of this report is to give the container developer a deeper understanding of what is installed in a container image during development. This allows a developer to glean basic information about the container such as what the true base operating system is, what the app dependencies are, if the container is using an official or personal repository for sources or binaries, whether the dependencies are at the correct versions, etc.
While the packages found in each layer and their associated version and license are listed on a per layer basis, there is also a summary of licenses found in the container printed at the bottom of the report which is unique to the default human readable format.
tern report -i golang:1.12-alpine -o output.txt
JSON Format
You can get the results in a JSON file to pass around in a network. The JSON report contains the most amount of container metadata compared to the default report and because of this, is often a very large file. If you are planning to look for information in this file manually, we recommend using the jq utility to better display and understand the information in the report.
In terms of general container information, the JSON report provides detailed "created by" information including docker container config information, layer created_by information and layer creation time stamps. It also provides the diff_id and tar file information for each layer, including each layer's unique package set and the packages metadata. The JSON report will also provide more detailed package metadata (if found) including the project URL information, files found in each package when run with scancode and package licenses (pkg_licenses) for containers based on Debian OSes where license information is parsed from Copyright text instead of declared by the package manager (pkg_license).
tern report -f json -i golang:1.12-alpine
HTML Format
You can get an html rendering of the JSON results. An output file with .html suffix should be provided in order to properly view the report in your browser. The HTML report will include all of the same information found in a JSON report. See above for details about the JSON report.
tern report -f html -i golang:1.12-alpine -o report.html
YAML Format
You can get the results in a YAML file to be consumed by a downstream tool or script. The YAML information will be the same information found in the JSON report. See above for details about the JSON report.
tern report -f yaml -i golang:1.12-alpine -o output.yaml
SPDX tag-value Format
SPDX is a format developed by the Linux Foundation to provide a standard way of reporting license information. It is now an ISO standard. The National Telecommunications and Information Administration (NTIA) recognizes SPDX as one of three valid SBOM formats that satisfies the minimum viable requirements for an SBOM in accordance with President Biden's Executive Order on Improving the Nation's Cybersecurity.
Many compliance tools are compatible with SPDX. Tern follows the SPDX specifications. The tag-value format is most compatible with the toolkit the organization provides. There are conversion tools available here (some still in development). You can read an overview of the SPDX tag-value specification here and about how Tern maps its properties to the keys mandated by the spec here.
tern report -f spdxtagvalue -i golang:1.12-alpine -o spdx.txt
SPDX JSON Format
The SPDX JSON format contains the same information that an SPDX Tag-value document does. The only difference between these two formats is the way the information is represented. The 'spdxjson' format represents the container information as a collection of key-value pairs. In some cases, the SPDX JSON format may be more interoperable between cloud native compliance tools.
tern report -f spdxjson -i golang:1.12-alpine -o spdx.json
CycloneDX JSON Format
OWASP CycloneDX is a lightweight software bill of materials standard designed for use in application security contexts and supply chain component analysis. The National Telecommunications and Information Administration (NTIA) recognizes CycloneDX as one of three valid SBOM formats that satisfies the minimum viable requirements for an SBOM in accordance with President Biden's Executive Order on Improving the Nation's Cybersecurity.
Many tools for producing and consuming CycloneDX SBOMs are listed in the CycloneDX Tool Center.
tern report -f cyclonedxjson -i golang:1.12-alpine -o bom.json
Extensions
Tern does not have its own file level license scanner. In order to fill in the gap, Tern allows you to extend container image analysis with an external file analysis CLI tool or Python3 module. In order to take advantage of the extensions, both the extention tool and Tern need to be installed.
NOTE: Neither the Docker container nor the Vagrant image has any of the extensions installed. You are welcomed to modify Dockerfile and vagrant/bootstrap.sh to install the extensions if you wish to use them. Please see the instructions below on how to enable the extension of your choice.
Scancode
scancode-toolkit is a license analysis tool that "detects licenses, copyrights, package manifests and direct dependencies and more both in source code and binary files". Note that Scancode currently works on Python 3.6 to 3.9. Be sure to check what python version you are using below.
NOTE Installation issues have been reported on macOS on M1 and Linux on ARM for Scancode>=31.0.0. If you are wanting to run Tern + Scancode in either of these environments, you will need to install scancode-toolkit-mini.
-
Install system dependencies for Scancode (refer to the Scancode GitHub repo for instructions)
-
Setup a python virtual environment
python3 -m venv scanenv
cd scanenv
source bin/activate
- Install tern and scancode
pip install tern scancode-toolkit
If you are using macOS on M1 or Linux on ARM, run:
pip install tern scancode-toolkit-mini
- Run tern with scancode
tern report -x scancode -i golang:1.12-alpine
If you are running Scancode for the first time, depending on the size of the container image, it takes anywhere between 10 minutes to a few hours to run due to the number of files needed to be analyzed. Once completed, subsequent runs will be much faster as the data will be cached for future use.
cve-bin-tool
cve-bin-tool is a command line tool which "scans for a number of common, vulnerable components (openssl, libpng, libxml2, expat and a few others) to let you know if your system includes common libraries with known vulnerabilities". Vulnerability scanning tools can also be extended to work on containers using Tern, although support for certain metadata pertaining to CVEs may not be available yet. As a result, you will not see any of the results in the generated reports.
-
Install system dependencies for cve-bin-tool (refer to the cve-bin-tool GitHub repo for instructions)
-
Setup a python virtual environment
python3 -m venv scanenv
cd scanenv
source bin/activate
- Install tern and cve-bin-tool
pip install tern cve-bin-tool
- Run tern with cve-bin-tool
tern report -x cve_bin_tool -i golang:1.12-alpine
Running tests
WARNING: The test_util_* tests are not up to date. We are working on it :). From the Tern repository root directory run:
python tests/<test file>.py
Project Status
Patched release 2.12.1 is out. See the release notes for more information. We try to keep the project roadmap as up to date as possible.
Recent Past Releases
- v2.12.0
- Includes an important security update for GitPython to address CVE-2022-24439
- v2.11.0
- v2.10.1
- v2.9.1
- v2.8.0
Documentation
Architecture, function blocks, code descriptions and the project roadmap are located in the docs folder. Contributions to the documentation are welcome! See the contributing guide to find out how to submit changes.
Get Involved
Do you have questions about Tern? Do you think it can do better? Would you like to make it better? You can get involved by giving your feedback and contributing to the code, documentation and conversation!
Please read our code of conduct first.
Next, take a look at the contributing guide to find out how you can start.
Top Related Projects
CLI tool and library for generating a Software Bill of Materials from container images and filesystems
Find vulnerabilities, misconfigurations, secrets, SBOM in containers, Kubernetes, code repositories, clouds and more
A vulnerability scanner for container images and filesystems
Vulnerability scanner written in Go which uses the data provided by https://osv.dev
OpenSSF Scorecard - Security health metrics for Open Source
Convert
designs to code with AI
Introducing Visual Copilot: A new AI model to turn Figma designs to high quality code using your components.
Try Visual Copilot