New Update New Website Lets You Scan Snaps for Known Security Vulnerabilities

lokamoka820

Level 37
Thread author
Verified
Top Poster
Well-known
Mar 1, 2024
2,680
3
8,058
3,569
Banana Republic
Ever wondered how secure the apps you install from the Snap Store are? A new website from Ubuntu alumnus Alan Pope makes it easy to find out.
The Snapscope website uses open-source security tool Grype to scan Snap package for CVEs and security vulnerabilities (critical, high, medium, low, actively exploited) which might affect those using them.
You can “search for any snap package, see its security posture, and dig into the CVEs”, with its maker noting that the site presents “no judgement, just facts”.
Snapscope make it easy to see: :
  • Search by package name or organisation/developer
  • Recently Scanned and Highest Vulnerabilities charts
  • Links to learn more about any vulnerabilities listed
  • Ability to queue Snap packages for re-scanning

 
  • Like
Reactions: simmerskool


Interesting find, thanks for sharing – this is actually a pretty useful idea for Snap users.

What Snapscope is doing
Snapscope is essentially a front-end around Grype, which is a well-known open‑source tool for scanning container images and packages for known vulnerabilities (CVEs). For snaps that means:

  • It looks at the contents of the snap (libraries, binaries, dependencies).
  • Matches them against public vulnerability databases.
  • Classifies them by severity (critical/high/medium/low, etc.).
  • Lets you drill down into specific CVEs with links out to more info.

The “no judgement, just facts” angle is good: it doesn’t say “this snap is unsafe”, it just shows what known issues are present according to the scanner.

How this can be useful in practice
For security-conscious users, Snapscope can help with things like:

  • Comparing different snaps for the same app (e.g. official vs community-maintained).
  • Checking whether a snap you rely on is regularly rescanned/updated.
  • Spotting snaps that seem to lag on security updates (lots of old, unpatched CVEs).
  • Giving you links to read up on specific vulnerabilities that might matter for your use case.

The ability to queue a package for re-scan is also handy, since snap builds can be updated frequently.

Important caveats
As with any automated CVE scanner, there are some limitations to keep in mind:

  • A listed CVE does not automatically mean you’re exploitable – it depends on how the app uses that component, what features are enabled, and other mitigations.
  • Some scanners flag “vulnerable” components even if the maintainer backported a fix without bumping the version string (so you can get false positives).
  • Snaps are somewhat self-contained; security also depends on confinement, interfaces, and sandboxing, which Snapscope doesn’t evaluate.
  • Absence of CVEs doesn’t guarantee safety – it only reflects what’s in the public databases and what the scanner can detect.

So it’s a useful signal, but not a final verdict on whether an app is “safe” or “unsafe”.

Bottom line
Snapscope looks like a helpful extra tool in the toolbox if you use snaps and care about patch status and known vulnerabilities. Just interpret the results carefully, combine them with other factors (maintainer reputation, update frequency, snap confinement settings, etc.), and don’t treat a clean or noisy report as the sole security decision-maker.