This document describes how Artifact Analysis evaluates vulnerabilities and assigns severity levels.
Artifact Analysis rates vulnerability severity using the following levels:
- Critical
- High
- Medium
- Low
These severity levels are qualitative labels that reflect factors such as
exploitability, scope, impact, and maturity of the vulnerability. For example,
if a vulnerability enables a remote user to access a system and run arbitrary
code without authentication or user interaction, that vulnerability
would be classified as Critical
.
Two additional types of severity are associated with each vulnerability:
-
Effective severity - Depending on the vulnerability type:
- OS packages - The severity level assigned by the Linux distribution maintainer. If these severity levels are unavailable, Artifact Analysis uses the severity value from the note provider, (NVD) . If NVD's CVSS v2 rating is unavailable, Artifact Analysis uses the CVSS v3 rating from NVD.
- Language packages - The severity level assigned by the GitHub Advisory Database, with a slight difference: Moderate is reported as Medium .
-
CVSS score - The Common Vulnerability Scoring System score and associated severity level, with two scoring versions:
What's next
- Investigate vulnerabilities .
- Gate builds in your Cloud Build pipeline based on vulnerability severity.

