
An image directory compliant with OCI Image Format.A tar archive stored in the docker save / podman save formatted file.A remote image in Docker Registry such as Docker Hub, ECR, GCR and ACR.A local image in Podman (>=2.0) which is exposing a socket.A local image in Docker Engine which is running as a daemon.Suitable for CI such as Travis CI, CircleCI, Jenkins, GitLab CI, etc.Especially Alpine Linux and RHEL/CentOS.No pre-requisites such as installation of DB, libraries, etc.apt-get install, yum install and brew install is possible (See Installation).
Unlike other scanners that take long to fetch vulnerability information (~10 minutes) on the first run, and encourage you to maintain a durable vulnerability database, Trivy is stateless and requires no maintenance or preparation.Consequent scans will finish in single seconds.
The first scan will finish within 10 seconds (depending on your network). Specify only an image name or artifact name. Application dependencies (Bundler, Composer, Pipenv, Poetry, npm, yarn, Cargo, NuGet, and Maven). OS packages (Alpine, Red Hat Universal Base Image, Red Hat Enterprise Linux, CentOS, Oracle Linux, Debian, Ubuntu, Amazon Linux, openSUSE Leap, SUSE Enterprise Linux, Photon OS and Distroless). Before pushing to a container registry or deploying your application, you can scan your local container image and other artifacts easily. All you need to do for scanning is to specify a target such as an image name of the container. Just install the binary and you're ready to scan. Trivy detects vulnerabilities of OS packages (Alpine, RHEL, CentOS, etc.) and application dependencies (Bundler, Composer, npm, yarn, etc.). A software vulnerability is a glitch, flaw, or weakness present in the software or in an Operating System. Trivy ( tri pronounced like trigger, vy pronounced like en vy) is a simple and comprehensive vulnerability scanner for containers and other artifacts. Authorization for Private Docker Registry. Skip traversal in the specific directory. Filter the vulnerabilities by Open Policy Agent. Filter the vulnerabilities by severities. Scan a container from inside the container. A Simple and Comprehensive Vulnerability Scanner for Containers and other Artifacts, Suitable for CI.