Tool
CLI
Vulnerability Management

trivy

by aquasecurity

31.0Kstars
2.9Kforks
183watchers
Updated about 1 month ago
About

Trivy is a comprehensive security scanner that detects vulnerabilities, misconfigurations, secrets, and generates SBOMs across containers, Kubernetes, code repositories, and cloud environments.

Find vulnerabilities, misconfigurations, secrets, SBOM in containers, Kubernetes, code repositories, clouds and more

Primary Use Case

Trivy is primarily used by developers, DevOps, and security teams to identify security risks in container images, filesystems, Kubernetes clusters, and code repositories before deployment. It helps ensure software supply chain security by scanning for vulnerabilities, misconfigurations, and sensitive information across various environments.

Key Features
  • Scans container images, filesystems, Git repositories, VM images, and Kubernetes clusters
  • Detects OS packages and software dependencies (SBOM generation)
  • Finds known vulnerabilities (CVEs) across multiple platforms
  • Identifies Infrastructure as Code (IaC) misconfigurations
  • Detects sensitive information and secrets
  • Supports scanning software licenses
  • Integrates with popular platforms like GitHub Actions, Kubernetes operators, and VS Code
  • Available via multiple distribution channels including Homebrew, Docker, and binaries

Installation

  • brew install trivy
  • docker run aquasec/trivy
  • Download binary from https://github.com/aquasecurity/trivy/releases/latest/

Usage

>_ trivy image python:3.4-alpine

Scan a container image for vulnerabilities and other security issues

>_ trivy fs --scanners vuln,secret,misconfig myproject/

Scan a filesystem directory for vulnerabilities, secrets, and misconfigurations

>_ trivy k8s --report summary cluster

Scan a Kubernetes cluster and generate a summary report

Security Frameworks
Reconnaissance
Discovery
Defense Evasion
Collection
Impact
Usage Insights
  • Integrate Trivy scans into CI/CD pipelines for automated vulnerability and misconfiguration detection before deployment.
  • Use Trivy's Kubernetes operator to continuously monitor cluster security posture and detect drift or misconfigurations.
  • Leverage secret detection capabilities to prevent accidental leakage of credentials in code repositories.
  • Combine Trivy SBOM generation with software supply chain security tools to enhance transparency and compliance.
  • Employ Trivy in purple team exercises to simulate attacker reconnaissance and improve detection capabilities.

Docs Take 2 Hours. AI Takes 10 Seconds.

Ask anything about trivy. Installation? Config? Troubleshooting? Get answers trained on real docs and GitHub issues—not generic ChatGPT fluff.

3 free chats per tool • Instant responses • No credit card

Security Profile
Red Team80%
Blue Team70%
Purple Team75%
Details
LicenseApache License 2.0
LanguageGo
Open Issues3004
Topics
security
security-tools
docker
containers
vulnerability-scanners
vulnerability-detection
vulnerability
golang
go
kubernetes