Skip to content

docs(csm-vm): add code-to-cloud Dockerfile source linking section#36897

Open
cyrbouchiat wants to merge 4 commits into
masterfrom
cyril/csm-vm-dockerfile-source-linking
Open

docs(csm-vm): add code-to-cloud Dockerfile source linking section#36897
cyrbouchiat wants to merge 4 commits into
masterfrom
cyril/csm-vm-dockerfile-source-linking

Conversation

@cyrbouchiat
Copy link
Copy Markdown
Contributor

Summary

  • Adds a new "Trace production vulnerabilities to source code" section to the Cloud Security Vulnerabilities overview page
  • Explains how Datadog links CVEs detected on running container images back to the Dockerfile and commit that introduced the vulnerable package (code-to-cloud mapping)
  • Cross-references the existing Link Dockerfile to vulnerabilities section in the CI/CD setup guide
  • Adds two screenshots (light/dark) showing the Dockerfile preview panel in the vulnerability detail view

Context

This section is part of DASH preparation, making the code-to-cloud remediation workflow more discoverable from the main vulnerabilities page.

Test plan

  • Verify the new section renders correctly between "Continuously detect..." and "Automation and Jira integration"
  • Verify the [Link Dockerfile to vulnerabilities] link resolves to the correct CI/CD anchor
  • Verify the screenshot displays correctly in both light and dark mode
  • Verify the new further_reading entry appears in the "Further reading" section at the bottom

Made with Cursor

@cyrbouchiat cyrbouchiat requested a review from a team as a code owner May 21, 2026 10:33
@cyrbouchiat cyrbouchiat requested a review from janine-c May 21, 2026 10:33
@github-actions github-actions Bot added the Images Images are added/removed with this PR label May 21, 2026
cyrbouchiat and others added 4 commits May 21, 2026 12:36
Add a new "Trace production vulnerabilities to source code" section to
the Cloud Security Vulnerabilities overview page. This section explains
how Datadog links CVEs detected on running container images back to the
Dockerfile and commit that introduced the vulnerable package, and
cross-references the CI/CD setup guide for OCI annotation configuration.

Also adds two screenshots (light/dark) showing the Dockerfile preview
panel in the vulnerability detail view.

Co-authored-by: Cursor <cursoragent@cursor.com>
@cyrbouchiat cyrbouchiat force-pushed the cyril/csm-vm-dockerfile-source-linking branch from 7b7c3cd to 1f12f59 Compare May 21, 2026 10:38
@github-actions
Copy link
Copy Markdown
Contributor

Preview links (active after the build_preview check completes)

Modified Files

@janine-c janine-c self-assigned this May 21, 2026
Copy link
Copy Markdown
Contributor

@janine-c janine-c left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Looks great, thank you, Cyril! Just some very minor feedback, but nothing to get in the way of merging when we're ready.


## Trace production vulnerabilities to source code

When a CVE is detected on a running container image, Datadog can link it directly to the Dockerfile and commit that introduced the vulnerable package. This closes the gap between a production alert and the code change that caused it, giving developers the context they need to remediate at the source rather than chasing package versions across registries.
Copy link
Copy Markdown
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggested change
When a CVE is detected on a running container image, Datadog can link it directly to the Dockerfile and commit that introduced the vulnerable package. This closes the gap between a production alert and the code change that caused it, giving developers the context they need to remediate at the source rather than chasing package versions across registries.
When Datadog detects a CVE on a running container image, it can link the CVE directly to the Dockerfile and commit that introduced the vulnerable package. This closes the gap between a production alert and the code change that caused it, giving developers the context they need to remediate at the source rather than chasing package versions across registries.

Hopefully clarifies what "it" in "can link it directly" refers to?

Copy link
Copy Markdown
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Docs don't use dark images, so you're good to remove this file 🙂


To enable this code-to-cloud mapping, add OCI image annotations to your container images at build time. Datadog uses these annotations to display a preview of the Dockerfile inside the Container Image Vulnerabilities panel and to surface the exact repository, commit, and file path associated with the vulnerability.

{{< img src="security/vulnerabilities/csm-vm-dockerfile-panel.png" alt="The Container Image Vulnerabilities panel showing a Dockerfile preview linked to a detected CVE" width="100%">}}
Copy link
Copy Markdown
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

This image seems to have gotten compressed somehow, so it's a bit blurry. It also shows a lot of the Ui, so it's hard to see which part is the relevant part of the page. I can help you make a more cropped version if you send me the URL, or maybe we don't need an image here?

@janine-c janine-c added the okr11 label May 21, 2026
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

Images Images are added/removed with this PR okr11

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants