[[["易于理解","easyToUnderstand","thumb-up"],["解决了我的问题","solvedMyProblem","thumb-up"],["其他","otherUp","thumb-up"]],[["很难理解","hardToUnderstand","thumb-down"],["信息或示例代码不正确","incorrectInformationOrSampleCode","thumb-down"],["没有我需要的信息/示例","missingTheInformationSamplesINeed","thumb-down"],["翻译问题","translationIssue","thumb-down"],["其他","otherDown","thumb-down"]],["最后更新时间 (UTC):2025-03-26。"],[[["This document details the process of uploading Vulnerability Exploitability eXchange (VEX) statements, which must adhere to the Common Security Advisory Format (CSAF) 2.0 standard in JSON, to Artifact Analysis."],["Uploading VEX statements requires specific IAM roles, such as Container Analysis Notes Editor, to create and update notes within the project."],["The `artifacts vulnerabilities load-vex` command is used to upload VEX data, where users specify the path to the CSAF-formatted JSON file and the URI of the resource or image."],["Artifact Analysis converts VEX statements into Grafeas `VulnerabilityAssessment` notes, storing them as one note per CVE within the Container Analysis API, and it carries VEX status information to associated vulnerability occurrences."],["Pre-GA features are available \"as is\" and might have limited support, and using this feature is subject to the \"Pre-GA Offerings Terms\" found in the General Service Terms section of the service specific terms."]]],[]]