# Trivy **Repository Path**: crazyss/Trivy ## Basic Information - **Project Name**: Trivy - **Description**: Trivy 是一个简单而且功能完整的容器漏洞扫描工具,特别使用用于持续集成 - **Primary Language**: Unknown - **License**: Apache-2.0 - **Default Branch**: main - **Homepage**: https://www.oschina.net/p/trivy - **GVP Project**: No ## Statistics - **Stars**: 0 - **Forks**: 5 - **Created**: 2022-11-23 - **Last Updated**: 2022-11-23 ## Categories & Tags **Categories**: Uncategorized **Tags**: None ## README
[![GitHub Release][release-img]][release] [![Test][test-img]][test] [![Go Report Card][go-report-img]][go-report] [![License: Apache-2.0][license-img]][license] [![GitHub All Releases][github-all-releases-img]][release] ![Docker Pulls][docker-pulls] [📖 Documentation][docs]
Trivy (`tri` pronounced like **tri**gger, `vy` pronounced like en**vy**) is a comprehensive security scanner. It is reliable, fast, extremely easy to use, and it works wherever you need it. Trivy has different *scanners* that look for different security issues, and different *targets* where it can find those issues. Targets: - Container Image - Filesystem - Git repository (remote) - Kubernetes cluster or resource Scanners: - OS packages and software dependencies in use (SBOM) - Known vulnerabilities (CVEs) - IaC misconfigurations - Sensitive information and secrets Much more scanners and targets are coming up. Missing something? Let us know! Read more in the [Trivy Documentation][docs] ## Quick Start ### Get Trivy Get Trivy by your favorite installation method. See [installation] section in the documentation for details. For example: - `apt-get install trivy` - `yum install trivy` - `pacman -S trivy` - `brew install aquasecurity/trivy/trivy` - `sudo port install trivy` - `docker run aquasec/trivy` - Download binary from https://github.com/aquasecurity/trivy/releases/latest/ ### General usage ```bash trivy [--security-checks ] TARGET_NAME ``` Examples: ```bash $ trivy image python:3.4-alpine ```
Result https://user-images.githubusercontent.com/1161307/171013513-95f18734-233d-45d3-aaf5-d6aec687db0e.mov
```bash $ trivy fs --security-checks vuln,secret,config myproject/ ```
Result https://user-images.githubusercontent.com/1161307/171013917-b1f37810-f434-465c-b01a-22de036bd9b3.mov
```bash $ trivy k8s --report summary cluster ```
Result ![k8s summary](docs/imgs/trivy-k8s.png)
Note that you can also receive a detailed scan, scan only a specific namespace, resource and more. Find out more in the [Trivy Documentation][docs] - [Getting Started][getting-started] ## Highlights - Comprehensive vulnerability detection - OS packages (Alpine Linux, Red Hat Universal Base Image, Red Hat Enterprise Linux, CentOS, AlmaLinux, Rocky Linux, CBL-Mariner, Oracle Linux, Debian, Ubuntu, Amazon Linux, openSUSE Leap, SUSE Enterprise Linux, Photon OS and Distroless) - **Language-specific packages** (Bundler, Composer, Pipenv, Poetry, npm, yarn, Cargo, NuGet, Maven, and Go) - High accuracy, especially [Alpine Linux][alpine] and RHEL/CentOS - Supply chain security (SBOM support) - Support CycloneDX - Support SPDX - Misconfiguration detection (IaC scanning) - Wide variety of security checks are provided **out of the box** - Kubernetes, Docker, Terraform, and more - User-defined policies using [OPA Rego][rego] - Secret detection - A wide variety of built-in rules are provided **out of the box** - User-defined patterns - Efficient scanning of container images - Simple - Available in apt, yum, brew, dockerhub - **No pre-requisites** such as a database, system libraries, or eny environmental requirements. The binary runs anywhere. - The first scan will finish within 10 seconds (depending on your network). Consequent scans will finish instantaneously. - Fits your workflow - **Great for CI** such as GitHub Actions, Jenkins, GitLab CI, etc. - Available as extension for IDEs such as vscode, jetbrains, vim - Available as extension for Docker Desktop, Rancher Desktop - See [integrations] section in the documentation. --- Trivy is an [Aqua Security][aquasec] open source project. Learn about our open source work and portfolio [here][oss]. Contact us about any matter by opening a GitHub Discussion [here][discussions] [test]: https://github.com/aquasecurity/trivy/actions/workflows/test.yaml [test-img]: https://github.com/aquasecurity/trivy/actions/workflows/test.yaml/badge.svg [go-report]: https://goreportcard.com/report/github.com/aquasecurity/trivy [go-report-img]: https://goreportcard.com/badge/github.com/aquasecurity/trivy [release]: https://github.com/aquasecurity/trivy/releases [release-img]: https://img.shields.io/github/release/aquasecurity/trivy.svg?logo=github [github-all-releases-img]: https://img.shields.io/github/downloads/aquasecurity/trivy/total?logo=github [docker-pulls]: https://img.shields.io/docker/pulls/aquasec/trivy?logo=docker&label=docker%20pulls%20%2F%20trivy [license]: https://github.com/aquasecurity/trivy/blob/main/LICENSE [license-img]: https://img.shields.io/badge/License-Apache%202.0-blue.svg [getting-started]: https://aquasecurity.github.io/trivy/latest/getting-started/installation/ [docs]: https://aquasecurity.github.io/trivy [integrations]:https://aquasecurity.github.io/trivy/latest/tutorials/integrations/ [installation]:https://aquasecurity.github.io/trivy/latest/getting-started/installation/ [releases]: https://github.com/aquasecurity/trivy/releases [alpine]: https://ariadne.space/2021/06/08/the-vulnerability-remediation-lifecycle-of-alpine-containers/ [rego]: https://www.openpolicyagent.org/docs/latest/#rego [aquasec]: https://aquasec.com [oss]: https://www.aquasec.com/products/open-source-projects/ [discussions]: https://github.com/aquasecurity/trivy/discussions