Vulnerability Analysisvulnerability scannercontainer securitymisconfigurationssecretssbomkubernetesfilesystemgit repository

Trivy

Comprehensive and versatile security scanner for vulnerabilities, misconfigurations, secrets, and SBOM in containers, Kubernetes, code repositories, clouds, and more. Targets include container images, filesystems, Git repositories, virtual machine images, Kubernetes, and AWS.

Description

Trivy is a security scanner that detects issues across various targets such as container images, filesystems, Git repositories, virtual machine images, Kubernetes clusters, and AWS environments. It identifies OS packages and software dependencies, known vulnerabilities (CVEs), IaC issues and misconfigurations, sensitive information and secrets, and software licenses.

Use cases include scanning container images for vulnerabilities before deployment, auditing local filesystems for misconfigurations and secrets, analyzing Git repositories for security issues, and checking Kubernetes clusters experimentally. It supports server mode for continuous scanning and provides utilities for report conversion and cache management.

The tool is versatile for DevSecOps pipelines, cloud security, and infrastructure as code validation, helping teams identify and remediate risks early in development and deployment processes.

How It Works

Trivy operates by scanning specified targets using dedicated scanners for OS packages/software dependencies (SBOM), CVEs, IaC misconfigurations, secrets, and licenses. It uses a cache directory for efficiency (default /root/.cache/trivy), configurable via --cache-dir, and supports formats like JSON via -f. Global flags control debug mode (-d), quiet output (-q), insecure connections (--insecure), and config files (-c trivy.yaml). Commands like image, fs, repository target specific environments, with experimental support for kubernetes and vm.

Installation

bash
sudo apt install trivy

Flags

--cache-dir stringcache directory (default "/root/.cache/trivy")
-c, --config stringconfig path (default "trivy.yaml")
-d, --debugdebug mode
-f, --format stringversion format (json)
--generate-default-configwrite the default config to trivy-default.yaml
-h, --helphelp for trivy
--insecureallow insecure server connections
-q, --quietsuppress progress bar and log output

Examples

Scan a container image
trivy image python:3.4-alpine
Scan a container image from a tar archive
trivy image --input ruby-3.1.tar
Scan local filesystem
trivy fs .
Run in server mode
trivy server
Scan config files for misconfigurations
trivy config
Scan local filesystem (full command)
trivy filesystem
Scan a repository
trivy repository
Scan SBOM for vulnerabilities and licenses
trivy sbom
Updated 2026-04-16kali.org ↗