The vulnerability scanning process includes these steps:
- The service pulls an image to Aqua servers.
- The service analyzes the image to discover the list of packages installed in it.
- The service checks for vulnerabilities in these packages and saves the results.
- The image is deleted from Aqua servers.