commands.sh

trivy

all

Scanner for vulnerabilities in container images, filesystems, and Git repositories, as well as for configuration issues.

More info →

Options (4)

-s, --severityboolean

Scan a Docker image filtering the output by severity

Example: trivy image {{[-s|--severity]}} {{HIGH,CRITICAL}} {{alpine:3.15}}
-f, --formatboolean

Generate output with a SARIF template

Example: trivy image {{[-f|--format]}} {{template}} {{[-t|--template]}} "{{@sarif.tpl}}" {{[-o|--output]}} {{path/to/report.sarif}} {{image:tag}}
-t, --templateboolean

Generate output with a SARIF template

Example: trivy image {{[-f|--format]}} {{template}} {{[-t|--template]}} "{{@sarif.tpl}}" {{[-o|--output]}} {{path/to/report.sarif}} {{image:tag}}
-o, --outputboolean

Generate output with a SARIF template

Example: trivy image {{[-f|--format]}} {{template}} {{[-t|--template]}} "{{@sarif.tpl}}" {{[-o|--output]}} {{path/to/report.sarif}} {{image:tag}}

Examples (8)

Scan a Docker image for vulnerabilities and exposed secrets

trivy image image:tag

Scan a Docker image filtering the output by severity

trivy image [-s|--severity] HIGH,CRITICAL alpine:3.15

Scan a Docker image ignoring any unfixed/unpatched vulnerabilities

trivy image --ignore-unfixed alpine:3.15

Scan the filesystem for vulnerabilities and misconfigurations

trivy fs --security-checks vuln,config path/to/project_directory

Scan a IaC (Terraform, CloudFormation, ARM, Helm, and Dockerfile) directory for misconfigurations

trivy config path/to/iac_directory

Scan a local or remote Git repository for vulnerabilities

trivy repo path/to/local_repository_directory|remote_repository_URL

Scan a Git repository up to a specific commit hash

trivy repo --commit commit_hash repository

Generate output with a SARIF template

trivy image [-f|--format] template [-t|--template] "@sarif.tpl" [-o|--output] path/to/report.sarif image:tag
made by @shridhargupta | data from tldr-pages