Sodamhan.com

TL;DR

trivy

Scanner for vulnerabilities in container images, file systems, and Git repositories, as well as for configuration issues. More information: https://aquasecurity.github.io/trivy.

  • Scan a Docker image for vulnerabilities and exposed secrets:

trivy image image:tag

  • Scan a Docker image filtering the output by severity:

trivy image --severity HIGH,CRITICAL alpine:3.15

  • Scan a Docker image ignoring any unfixed/unpatched vulnerabilities:

trivy image --ignore-unfixed alpine:3.15

  • Scan the filesystem for vulnerabilities and misconfigurations:

trivy fs --security-checks vuln,config path/to/project_directory

  • Scan a IaC (Terraform, CloudFormation, ARM, Helm and Dockerfile) directory for misconfigurations:

trivy config path/to/iac_directory

  • Scan a local or remote Git repository for vulnerabilities:

trivy repo path/to/local_repository_directory|remote_repository_URL

  • Scan a Git repository up to a specific commit hash:

trivy repo --commit commit_hash repository

  • Generate output with a SARIF template:

trivy image --format template --template "@sarif.tpl" -o path/to/report.sarif image:tag

This document was created using the contents of the tldr project.